Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 11, January-2
Previous Issue
Volume 10, December-2
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Mathematics, Volume 11, Issue 1 (January-1 2023) – 255 articles

Cover Story (view full-size image): Following random forest methodology, the FRSF is proposed as a new machine learning technique for solving time-to-event data using an ensemble of multiple fuzzy survival trees. In the learning process, the combination of methods such as the c-index, fuzzy sets theory, and the ensemble of multiple trees enable the automatic handling of imprecise data. We analyze the results of several experiments and test them statistically; they show the FRSF’s robustness, verifying that its generalization capacity is not reduced when modeling imprecise data. Furthermore, the results obtained using a real portfolio of a life insurance company demonstrate that the FRSF has a better performance in comparison with other state-of-the-art algorithms such as the traditional Cox model and other tree-based machine learning techniques such as the random survival forest. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
5 pages, 198 KiB  
Editorial
Mathematics in Finite Element Modeling of Computational Friction Contact Mechanics 2021–2022
by Nicolae Pop, Marin Marin and Sorin Vlase
Mathematics 2023, 11(1), 255; https://doi.org/10.3390/math11010255 - 3 Jan 2023
Cited by 3 | Viewed by 2727
Abstract
In engineering practice, structures with identical components or parts are useful from several points of view: less information is needed to describe the system; designs can be conceptualized quicker and easier; components are made faster than during traditional complex assembly; and finally, the [...] Read more.
In engineering practice, structures with identical components or parts are useful from several points of view: less information is needed to describe the system; designs can be conceptualized quicker and easier; components are made faster than during traditional complex assembly; and finally, the time needed to achieve the structure and the cost involved in manufacturing decrease. Additionally, the subsequent maintenance of this system then becomes easier and cheaper. The aim of this Special Issue is to provide an opportunity for international researchers to share and review recent advances in the finite element modeling of computational friction contact mechanics. Numerical modeling in mathematics, mechanical engineering, computer science, computers, etc. presents many challenges. The finite element method applied in solid mechanics was designed by engineers to simulate numerical models in order to reduce the design costs of prototypes, tests and measurements. This method was initially validated only by measurements but gave encouraging results. After the discovery of Sobolev spaces, the abovementioned results were obtained, and today, numerous researchers are working on improving this method. Some of applications of this method in solid mechanics include mechanical engineering, machine and device design, civil engineering, aerospace and automotive engineering, robotics, etc. Frictional contact is a complex phenomenon that has led to research in mechanical engineering, computational contact mechanics, composite material design, rigid body dynamics, robotics, etc. A good simulation requires that the dynamics of contact with friction be included in the formulation of the dynamic system so that an approximation of the complex phenomena can be made. To solve these linear or nonlinear dynamic systems, which often have non-differentiable terms, or discontinuities, software that considers these high-performance numerical methods and computers with high computing power are needed. This Special Issue is dedicated to this kind of mechanical structure and to describing the properties and methods of analysis of these structures. Discrete or continuous structures in static and dynamic cases are also considered. Additionally, theoretical models, mathematical methods and numerical analysis of these systems, such as the finite element method and experimental methods, are used in these studies. Machine building, automotive, aerospace and civil engineering are the main areas in which such applications appear, but they can also be found in most other engineering fields. With this Special Issue, we want to disseminate knowledge among researchers, designers, manufacturers and users in this exciting field. Full article
(This article belongs to the Special Issue Finite Element Modeling in Computational Friction Contact Mechanics)
19 pages, 973 KiB  
Article
Estimating the Risk of Contracting COVID-19 in Different Settings Using a Multiscale Transmission Dynamics Model
by Dramane Sam Idris Kanté, Aissam Jebrane, Anass Bouchnita and Abdelilah Hakim
Mathematics 2023, 11(1), 254; https://doi.org/10.3390/math11010254 - 3 Jan 2023
Cited by 7 | Viewed by 3823
Abstract
Airborne transmission is the dominant route of coronavirus disease 2019 (COVID-19) transmission. The chances of contracting COVID-19 in a particular situation depend on the local demographic features, the type of inter-individual interactions, and the compliance with mitigation measures. In this work, we develop [...] Read more.
Airborne transmission is the dominant route of coronavirus disease 2019 (COVID-19) transmission. The chances of contracting COVID-19 in a particular situation depend on the local demographic features, the type of inter-individual interactions, and the compliance with mitigation measures. In this work, we develop a multiscale framework to estimate the individual risk of infection with COVID-19 in different activity areas. The framework is parameterized to describe the motion characteristics of pedestrians in workplaces, schools, shopping centers and other public areas, which makes it suitable to study the risk of infection under specific scenarios. First, we show that exposure to individuals with peak viral loads increases the chances of infection by 99%. Our simulations suggest that the risk of contracting COVID-19 is especially high in workplaces and residential areas. Next, we determine the age groups that are most susceptible to infection in each location. Then, we show that if 50% of the population wears face masks, this will reduce the chances of infection by 8%, 32%, or 45%, depending on the type of the used mask. Finally, our simulations suggest that compliance with social distancing reduces the risk of infection by 19%. Our framework provides a tool that assesses the location-specific risk of infection and helps determine the most effective behavioral measures that protect vulnerable individuals. Full article
(This article belongs to the Special Issue Mathematical Modelling in Biomedicine III)
Show Figures

Figure 1

Figure 1
<p>Schematic representation of the model parameters defining the interactions between two pedestrians described as blue disks. Each individual has a center <math display="inline"><semantics> <msub> <mi>x</mi> <mi>i</mi> </msub> </semantics></math> and a radius <math display="inline"><semantics> <msub> <mi>r</mi> <mi>i</mi> </msub> </semantics></math>. The distancing separating the two individuals <span class="html-italic">i</span> and <span class="html-italic">j</span> is described <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> </semantics></math>, while we denote the distance separating an individual from a wall <span class="html-italic">w</span> by <math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>i</mi> <mi>w</mi> </mrow> </msub> </semantics></math>. The desired velocity of each individual is <math display="inline"><semantics> <msub> <mi>v</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>i</mi> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> </semantics></math> is the angle between the direction of the desired velocity of <span class="html-italic">i</span> and the distance between the individual <span class="html-italic">i</span> and <span class="html-italic">j</span>.</p>
Full article ">Figure 2
<p>A screenshot of a numerical simulation showing the location of pedestrians and the concentration of the virus in the air. White circles describe susceptible individuals. Pink and green ones represent infectious and infected individuals, respectively. The size of each individual correlates with its weight. The green to yellow gradient describes the concentration of the virus in the air.</p>
Full article ">Figure 3
<p>The average SARS-CoV-2 inoculum in different activity areas. (<b>A</b>) The mean <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math> in each place of activity, the black ribbons describe the 95% confidence intervals. (<b>B</b>) The distribution of the inhaled virus concentration among individuals in different locations.</p>
Full article ">Figure 4
<p>Average number of inhaled virus particles per age group in different locations of activity. (<b>A</b>–<b>E</b>) The average inhaled concentration (<math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math>) by age group in shopping centers, residential areas, schools, public spaces, and workplaces. (<b>F</b>–<b>J</b>) Scatterplot of the inhaled concentration <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math> and the weight in shopping centers, residential areas, schools, public spaces and workplaces.</p>
Full article ">Figure 5
<p>The inhaled concentration of SARS-CoV-2 following exposure to three infectious individuals who emit different concentrations of the virus. The risk of infection is estimated in three scenarios where desired interpersonal distances and desired velocities are homogeneous <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mrow> <mi>s</mi> <mi>o</mi> <mi>c</mi> </mrow> </msub> <mo>=</mo> <mn>1.22</mn> </mrow> </semantics></math> m, <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mrow> <mi>d</mi> <mo>,</mo> <mi>i</mi> </mrow> </msub> <mo>=</mo> <mn>1.34</mn> </mrow> </semantics></math> m/s. The considered scenarios are: (a) typical emitters breathing and making two series of coughs at minutes 3 and 6 of the simulation time. When breathing, they release <math display="inline"><semantics> <mrow> <mi>w</mi> <mo>=</mo> <mn>4.9</mn> </mrow> </semantics></math> copies/m<sup>3</sup> and when they cough they produce the concentration <span class="html-italic">w</span> = 277,000 copies/m<sup>3</sup>, (b) high emitters of SARS-COV-2 who only breathe while moving <span class="html-italic">w</span> = 637,000 copies/m<sup>3</sup>, (c) high emitters breathing and making two series of coughs at different moments. When breathing, they release 637,000 copies/m<sup>3</sup> and when they cough, they emit <span class="html-italic">w</span> = 36,030 × 10<sup>6</sup> copies/m<sup>3</sup>. The average <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math> is estimated for each scenario. 95% confidence intervals are represented as error bars.</p>
Full article ">Figure 6
<p>The estimated reduction in the average risk of infection as a function of compliance to mask wearing and the type of used masks. The average reduction in the infection probability was estimated for several simulations where proportions of individuals wear masks with different filtering efficacy.</p>
Full article ">Figure 7
<p>Impact of social distancing on the individual chances of infection. The average inhaled concentration of the virus infection as a function of the interpersonal distance (<math display="inline"><semantics> <msub> <mi>d</mi> <mrow> <mi>s</mi> <mi>o</mi> <mi>c</mi> </mrow> </msub> </semantics></math>). Intervals indicate 95% confidence intervals.</p>
Full article ">Figure 8
<p>Comparison of our age groups that are most likely to be infected with the data reported by the Moroccan Ministry of health on 2020. (<b>A</b>) The estimated average inhaled virus concentration (<math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math>) in all places of activity per age group, calculated using our model. (<b>B</b>) The probability of infection per age group according to the Ministry of health report [<a href="#B71-mathematics-11-00254" class="html-bibr">71</a>].</p>
Full article ">Figure A1
<p>The impact of the virus inhalation and virus clearance rates. (<b>A</b>) The average <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math> for three values of the inhalation rate <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>1.3</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> <mo>,</mo> <mspace width="0.277778em"/> <mn>1.3</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> <mo>,</mo> <mspace width="0.277778em"/> <mn>2</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> <mspace width="0.277778em"/> <msup> <mi>m</mi> <mn>3</mn> </msup> <mo>/</mo> <mi>s</mi> </mrow> </semantics></math>. (<b>B</b>) The average <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math> for three values of the virus clearance rate <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>1.9</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>6</mn> </mrow> </msup> <mo>,</mo> <mspace width="0.277778em"/> <mn>1.9</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> <mo>,</mo> <mspace width="0.277778em"/> <mn>3</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math> s <sup>−1</sup>.</p>
Full article ">Figure A2
<p>The impact of diffusion coefficient on the accumulation of the virus. Other parameters are fixed and the considered population is homogeneous.</p>
Full article ">Figure A3
<p>Impact of the walking velocity on the risk of infection in a homogeneous population <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mrow> <mi>s</mi> <mi>o</mi> <mi>c</mi> </mrow> </msub> <mo>=</mo> <mn>1.22</mn> </mrow> </semantics></math> m; with three infectious persons who continuously release a viral load <math display="inline"><semantics> <mrow> <mi>w</mi> <mo>=</mo> <mn>277</mn> </mrow> </semantics></math> copies/m<sup>3</sup>. The coefficient of diffusion moderates the relationship between velocity and risk of infection. We represent the impact of the velocity on <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math> for a diffusion coefficient <math display="inline"><semantics> <mrow> <mi>D</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> m<sup>2</sup>/s (<b>A</b>). and the impact of the velocity on <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>a</mi> <mi>c</mi> <mi>c</mi> </mrow> </msub> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>D</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math> m<sup>2</sup>/s (<b>B</b>).</p>
Full article ">
21 pages, 927 KiB  
Article
Equation-Based Modeling vs. Agent-Based Modeling with Applications to the Spread of COVID-19 Outbreak
by Selain K. Kasereka, Glody N. Zohinga, Vogel M. Kiketa, Ruffin-Benoît M. Ngoie, Eddy K. Mputu, Nathanaël M. Kasoro and Kyamakya Kyandoghere
Mathematics 2023, 11(1), 253; https://doi.org/10.3390/math11010253 - 3 Jan 2023
Cited by 12 | Viewed by 4268
Abstract
In this paper, we explore two modeling approaches to understanding the dynamics of infectious diseases in the population: equation-based modeling (EBM) and agent-based modeling (ABM). To achieve this, a comparative study of these approaches was conducted and we highlighted their advantages and disadvantages. [...] Read more.
In this paper, we explore two modeling approaches to understanding the dynamics of infectious diseases in the population: equation-based modeling (EBM) and agent-based modeling (ABM). To achieve this, a comparative study of these approaches was conducted and we highlighted their advantages and disadvantages. Two case studies on the spread of the COVID-19 pandemic were carried out using both approaches. The results obtained show that differential equation-based models are faster but still simplistic, while agent-based models require more machine capabilities but are more realistic and very close to biology. Based on these outputs, it seems that the coupling of both approaches could be an interesting compromise. Full article
(This article belongs to the Special Issue Mathematical Methods for Computer Science)
Show Figures

Figure 1

Figure 1
<p>EBM—transfer diagram describing the COVID-19 dynamics in the population.</p>
Full article ">Figure 2
<p>ABM—transfer diagram describing the COVID-19 dynamics in the population.</p>
Full article ">Figure 3
<p>Global illustration of the agent environment with susceptible individuals: green; exposed individuals: yellow; infected individuals: red; asymptomatic individuals: pink; recovered individuals: blue; recovered spontaneously (without any treatment): white.</p>
Full article ">Figure 4
<p>Random distribution of agents in a <math display="inline"><semantics> <mrow> <mn>50</mn> <mo>×</mo> <mn>50</mn> </mrow> </semantics></math> grid environment for the discrete agent-based model. The colored dot represents individuals with their specific status (Susceptible: green; exposed: yellow; infected: red; asymptomatic: pink; recovered with treatment: blue; recovered without treatment: white).</p>
Full article ">Figure 5
<p>General dynamics of the disease with <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="script">R</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>3.2004</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Illustration of the progression of the infected individuals according to the <math display="inline"><semantics> <msub> <mi mathvariant="script">R</mi> <mn>0</mn> </msub> </semantics></math>.</p>
Full article ">Figure 7
<p>Progression of the infected individuals according to the parameter <math display="inline"><semantics> <mi mathvariant="normal">Λ</mi> </semantics></math>. Blue color: <math display="inline"><semantics> <mrow> <mi mathvariant="normal">Λ</mi> <mo>=</mo> <mn>0.095</mn> </mrow> </semantics></math>, blue color: <math display="inline"><semantics> <mrow> <mi mathvariant="normal">Λ</mi> <mo>=</mo> <mn>0.104</mn> </mrow> </semantics></math>, and red color: <math display="inline"><semantics> <mrow> <mi mathvariant="normal">Λ</mi> <mo>=</mo> <mn>0.404</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Simulations of the model according to parameter values from <a href="#mathematics-11-00253-t004" class="html-table">Table 4</a>. With (<b>a</b>) the initial situation, (<b>b</b>–<b>d</b>) display the disease evolution up to a given time <span class="html-italic">t</span>.</p>
Full article ">Figure 9
<p>Dynamics of COVID-19 according to the radius of contamination equal to 1 m.</p>
Full article ">Figure 10
<p>Dynamics of COVID-19 according to the radius of contamination equal to 2 m.</p>
Full article ">Figure 11
<p>Dynamics of COVID-19 according to the radius of contamination equal to 5 m.</p>
Full article ">Figure 12
<p>Comparative curves for the two models with: (<b>a</b>): the EBM for <math display="inline"><semantics> <mrow> <mi>S</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>; (<b>b</b>): the ABM for <math display="inline"><semantics> <mrow> <mi>S</mi> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>; (<b>c</b>): the EBM for <math display="inline"><semantics> <mrow> <mi>S</mi> <mo>=</mo> <mn>500</mn> </mrow> </semantics></math>; (<b>d</b>): the ABM for <math display="inline"><semantics> <mrow> <mi>S</mi> <mo>=</mo> <mn>500</mn> </mrow> </semantics></math>; (<b>e</b>): the EBM for <math display="inline"><semantics> <mrow> <mi>S</mi> <mo>=</mo> <mn>1000</mn> </mrow> </semantics></math>; (<b>f</b>): the ABM for <math display="inline"><semantics> <mrow> <mi>S</mi> <mo>=</mo> <mn>1000</mn> </mrow> </semantics></math>.</p>
Full article ">
17 pages, 2652 KiB  
Article
Estimation of Coefficient of Variation Using Calibrated Estimators in Double Stratified Random Sampling
by Usman Shahzad, Ishfaq Ahmad, Amelia V. García-Luengo, Tolga Zaman, Nadia H. Al-Noor and Anoop Kumar
Mathematics 2023, 11(1), 252; https://doi.org/10.3390/math11010252 - 3 Jan 2023
Cited by 11 | Viewed by 2897
Abstract
One of the most useful indicators of relative dispersion is the coefficient of variation. The characteristics of the coefficient of variation have contributed to its widespread use in most scientific and academic disciplines, with real life applications. The traditional estimators of the coefficient [...] Read more.
One of the most useful indicators of relative dispersion is the coefficient of variation. The characteristics of the coefficient of variation have contributed to its widespread use in most scientific and academic disciplines, with real life applications. The traditional estimators of the coefficient of variation are based on conventional moments; therefore, these are highly affected by the presence of extreme values. In this article, we develop some novel calibration-based coefficient of variation estimators for the study variable under double stratified random sampling (DSRS) using the robust features of linear (L and TL) moments, which offer appropriate coefficient of variation estimates. To evaluate the usefulness of the proposed estimators, a simulation study is performed by using three populations out of which one is based on the COVID-19 pandemic data set and the other two are based on apple fruit data sets. The relative efficiency of the proposed estimators with respect to the existing estimators has been calculated. The superiority of the suggested estimators over the existing estimators are clearly validated by using the real data sets. Full article
Show Figures

Figure 1

Figure 1
<p>First population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>1</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 2
<p>First population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>2</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 3
<p>First population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>3</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 4
<p>First population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>4</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 5
<p>Second population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>1</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 6
<p>Second population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>2</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 7
<p>Second population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>3</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 8
<p>Second population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>4</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 9
<p>Third population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>1</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 10
<p>Third population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>2</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 11
<p>Third population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>3</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 12
<p>Third population for <math display="inline"><semantics> <mrow> <mi>h</mi> <mo>=</mo> <mn>4</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">
15 pages, 3361 KiB  
Article
Newton-Based Extremum Seeking for Dynamic Systems Using Kalman Filtering: Application to Anaerobic Digestion Process Control
by Yang Tian, Ning Pan, Maobo Hu, Haoping Wang, Ivan Simeonov, Lyudmila Kabaivanova and Nicolai Christov
Mathematics 2023, 11(1), 251; https://doi.org/10.3390/math11010251 - 3 Jan 2023
Cited by 3 | Viewed by 1979
Abstract
In this paper, a new Newton-based extremum-seeking control for dynamic systems is proposed using Kalman filter for gradient and Hessian estimation as well as a stochastic perturbation signal with time-varying amplitude. The obtained Kalman filter based Newton extremum-seeking control (KFNESC) makes it possible [...] Read more.
In this paper, a new Newton-based extremum-seeking control for dynamic systems is proposed using Kalman filter for gradient and Hessian estimation as well as a stochastic perturbation signal with time-varying amplitude. The obtained Kalman filter based Newton extremum-seeking control (KFNESC) makes it possible to accelerate the convergence to the extremum and attenuate the steady-state oscillations. The convergence and oscillation attenuation properties of the closed-loop system with KFNESC are considered, and the proposed control is applied to a two-stages anaerobic digestion process in order to maximize the hydrogen production rate, which has better robustness and a slower steady-state oscillation with the comparison of Newton-based ESC and sliding mode ESC. Full article
(This article belongs to the Special Issue Automatic Control and Soft Computing in Engineering)
Show Figures

Figure 1

Figure 1
<p>Structure of the Kalman filter based Newton extremum-seeking control for dynamic systems.</p>
Full article ">Figure 2
<p>AD process with production of hydrogen and methane.</p>
Full article ">Figure 3
<p>Static characteristics <math display="inline"><semantics> <mrow> <msub> <mi>D</mi> <mn>1</mn> </msub> <mo>−</mo> <msub> <mi>Q</mi> <mrow> <msub> <mi>H</mi> <mn>2</mn> </msub> </mrow> </msub> </mrow> </semantics></math> for different <math display="inline"><semantics> <mrow> <msubsup> <mi>S</mi> <mn>0</mn> <mrow> <mi>i</mi> <mi>n</mi> </mrow> </msubsup> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The Structure of the Sliding mode extremum-seeking control for dynamic systems.</p>
Full article ">Figure 5
<p>The Structure of the Newton-based extremum-seeking control for dynamic systems.</p>
Full article ">Figure 6
<p>AD processes for different ESC and hydrogen production rate as optimization target. (<b>a</b>) Input: dilution rate, (<b>b</b>) Optimization target: hydrogen production rate, (<b>c</b>) Methane production rate.</p>
Full article ">Figure 7
<p>State variables trajectories of the AD process with KFNESC for <math display="inline"><semantics> <mrow> <msubsup> <mi mathvariant="normal">S</mi> <mn>0</mn> <mrow> <mi>in</mi> </mrow> </msubsup> </mrow> </semantics></math> stepwise changes and hydrogen production rate as optimization target. (<b>a</b>) Trajectories of substrates concentrations in BR1, (<b>b</b>) Trajectories of concentrations of VFAs in BR1, (<b>c</b>) Trajectory of biomass concentration in BR1, (<b>d</b>) Trajectories of concentrations of VFAs in BR2, (<b>e</b>) Trajectories of concentrations of biomasses in BR2.</p>
Full article ">Figure 7 Cont.
<p>State variables trajectories of the AD process with KFNESC for <math display="inline"><semantics> <mrow> <msubsup> <mi mathvariant="normal">S</mi> <mn>0</mn> <mrow> <mi>in</mi> </mrow> </msubsup> </mrow> </semantics></math> stepwise changes and hydrogen production rate as optimization target. (<b>a</b>) Trajectories of substrates concentrations in BR1, (<b>b</b>) Trajectories of concentrations of VFAs in BR1, (<b>c</b>) Trajectory of biomass concentration in BR1, (<b>d</b>) Trajectories of concentrations of VFAs in BR2, (<b>e</b>) Trajectories of concentrations of biomasses in BR2.</p>
Full article ">Figure 8
<p>Trajectories of the operating point in the plan <math display="inline"><semantics> <mrow> <msub> <mi>D</mi> <mn>1</mn> </msub> <mo>−</mo> <msub> <mi>Q</mi> <mrow> <msub> <mi>H</mi> <mn>2</mn> </msub> </mrow> </msub> </mrow> </semantics></math> for different initial values of the dilution rate under KFNESC.</p>
Full article ">
17 pages, 888 KiB  
Article
Delayed Impulsive Control for μ-Synchronization of Nonlinear Multi-Weighted Complex Networks with Uncertain Parameter Perturbation and Unbounded Delays
by Hongguang Fan, Jiahui Tang, Kaibo Shi, Yi Zhao and Hui Wen
Mathematics 2023, 11(1), 250; https://doi.org/10.3390/math11010250 - 3 Jan 2023
Cited by 6 | Viewed by 1754
Abstract
The global μ-synchronization problem for nonlinear multi-weighted complex dynamical networks with uncertain parameter perturbation and mixed time-varying delays is investigated in this paper. Unlike other existing works, all delays, including sampling and internal and coupling delays, are assumed to be unbounded, making [...] Read more.
The global μ-synchronization problem for nonlinear multi-weighted complex dynamical networks with uncertain parameter perturbation and mixed time-varying delays is investigated in this paper. Unlike other existing works, all delays, including sampling and internal and coupling delays, are assumed to be unbounded, making the considered model more general and practical. Based on the generalized impulsive comparison principles, a time-varying impulsive controller with sampling delays is designed, and some new sufficient conditions are obtained to make drive–response multi-weighted networks reach μ-synchronization. In addition, the external coupling matrices do not need to meet the requirement of zero-row sum, and the limitation of time delay on pulse interval is weakened. The results obtained in this article can be seen as extensions of previous related research. Full article
(This article belongs to the Topic Engineering Mathematics)
Show Figures

Figure 1

Figure 1
<p>The schematic diagram of the logistic network: (<b>A</b>) complete logistic network; (<b>A1</b>) highway network; (<b>A2</b>) railway network; (<b>A3</b>) air network.</p>
Full article ">Figure 2
<p>(<b>a</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> through the effective impulsive matrix <span class="html-italic">M</span>. One can see that <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> approach zero over time, which shows complex networks (<a href="#FD23-mathematics-11-00250" class="html-disp-formula">23</a>) and (<a href="#FD22-mathematics-11-00250" class="html-disp-formula">22</a>) can achieve synchronization in this case. (<b>b</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> through the impulsive gain matrix <math display="inline"><semantics> <mrow> <msup> <mi>M</mi> <mo>*</mo> </msup> <mo>=</mo> <mi>M</mi> <mo>+</mo> <mn>0.1</mn> <mi>I</mi> </mrow> </semantics></math>. Since <math display="inline"><semantics> <msup> <mi>M</mi> <mo>*</mo> </msup> </semantics></math> breaks the conditions of Corollary 1, one can see that <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> cannot approach zero over time and the synchronization fails in this instance.</p>
Full article ">Figure 2 Cont.
<p>(<b>a</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> through the effective impulsive matrix <span class="html-italic">M</span>. One can see that <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> approach zero over time, which shows complex networks (<a href="#FD23-mathematics-11-00250" class="html-disp-formula">23</a>) and (<a href="#FD22-mathematics-11-00250" class="html-disp-formula">22</a>) can achieve synchronization in this case. (<b>b</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> through the impulsive gain matrix <math display="inline"><semantics> <mrow> <msup> <mi>M</mi> <mo>*</mo> </msup> <mo>=</mo> <mi>M</mi> <mo>+</mo> <mn>0.1</mn> <mi>I</mi> </mrow> </semantics></math>. Since <math display="inline"><semantics> <msup> <mi>M</mi> <mo>*</mo> </msup> </semantics></math> breaks the conditions of Corollary 1, one can see that <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> cannot approach zero over time and the synchronization fails in this instance.</p>
Full article ">Figure 3
<p>(<b>a</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> through the effective impulsive matrix <span class="html-italic">M</span>. One can see that synchronization errors <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> approach zero over time, which implies response network (<a href="#FD23-mathematics-11-00250" class="html-disp-formula">23</a>) achieves synchronization with drive network (<a href="#FD22-mathematics-11-00250" class="html-disp-formula">22</a>) in this case. (<b>b</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> under impulsive gain matrix <math display="inline"><semantics> <mrow> <msup> <mi>M</mi> <mo>*</mo> </msup> <mo>=</mo> <mi>M</mi> <mo>−</mo> <mn>0.1</mn> <mi>I</mi> </mrow> </semantics></math>. Since matrix <math display="inline"><semantics> <msup> <mi>M</mi> <mo>*</mo> </msup> </semantics></math> breaks the conditions of Corollary 2, one can see that <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> cannot approach zero over time and the synchronization fails in this situation.</p>
Full article ">Figure 3 Cont.
<p>(<b>a</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> through the effective impulsive matrix <span class="html-italic">M</span>. One can see that synchronization errors <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> approach zero over time, which implies response network (<a href="#FD23-mathematics-11-00250" class="html-disp-formula">23</a>) achieves synchronization with drive network (<a href="#FD22-mathematics-11-00250" class="html-disp-formula">22</a>) in this case. (<b>b</b>) Time evolution of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> under impulsive gain matrix <math display="inline"><semantics> <mrow> <msup> <mi>M</mi> <mo>*</mo> </msup> <mo>=</mo> <mi>M</mi> <mo>−</mo> <mn>0.1</mn> <mi>I</mi> </mrow> </semantics></math>. Since matrix <math display="inline"><semantics> <msup> <mi>M</mi> <mo>*</mo> </msup> </semantics></math> breaks the conditions of Corollary 2, one can see that <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> </mrow> </mrow> </semantics></math> cannot approach zero over time and the synchronization fails in this situation.</p>
Full article ">
19 pages, 2620 KiB  
Article
Retaliation against Ransomware in Cloud-Enabled PureOS System
by Atef Ibrahim, Usman Tariq, Tariq Ahamed Ahanger, Bilal Tariq and Fayez Gebali
Mathematics 2023, 11(1), 249; https://doi.org/10.3390/math11010249 - 3 Jan 2023
Cited by 4 | Viewed by 2378
Abstract
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades. There are numerous variations of ransomware, each of which can encrypt either the [...] Read more.
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades. There are numerous variations of ransomware, each of which can encrypt either the entire computer system or specific files. Malicious software needs to infiltrate a system before it can do any real damage. Manually inspecting all potentially malicious file types is a time-consuming and resource-intensive requirement of conventional security software. Using established metrics, this research delves into the complex issues of identifying and preventing ransomware. On the basis of real-world malware samples, we created a parameterized categorization strategy for functional classes and suggestive features. We also furnished a set of criteria that highlights the most commonly featured criteria and investigated both behavior and insights. We used a distinct operating system and specific cloud platform to facilitate remote access and collaboration on files throughout the entire operational experimental infrastructure. With the help of our proposed ransomware detection mechanism, we were able to effectively recognize and prevent both state-of-art and modified ransomware anomalies. Aggregated log revealed a consistent but satisfactory detection rate at 89%. To the best of our knowledge, no research exists that has investigated the ransomware detection and impact of ransomware for PureOS, which offers a unique platform for PC, mobile phones, and resource intensive IoT (Internet of Things) devices. Full article
Show Figures

Figure 1

Figure 1
<p>An outline of our methodology for the analysis.</p>
Full article ">Figure 2
<p>The procedures for collecting function calls are as follows: step one: extract each instance from the feature set; step two: run employing reference and feed the logfile; step three: support for hypothesis, analyze the similarities, and predict unknown patterns as safe or malicious.</p>
Full article ">Figure 3
<p>Detection percentage for ransomware (Trail 1, 2, 3 &amp; 4).</p>
Full article ">Figure 4
<p>Comparative Analysis [<a href="#B8-mathematics-11-00249" class="html-bibr">8</a>,<a href="#B9-mathematics-11-00249" class="html-bibr">9</a>,<a href="#B10-mathematics-11-00249" class="html-bibr">10</a>,<a href="#B11-mathematics-11-00249" class="html-bibr">11</a>,<a href="#B12-mathematics-11-00249" class="html-bibr">12</a>,<a href="#B14-mathematics-11-00249" class="html-bibr">14</a>,<a href="#B15-mathematics-11-00249" class="html-bibr">15</a>].</p>
Full article ">
11 pages, 790 KiB  
Article
Product Convolution of Generalized Subexponential Distributions
by Gustas Mikutavičius and Jonas Šiaulys
Mathematics 2023, 11(1), 248; https://doi.org/10.3390/math11010248 - 3 Jan 2023
Cited by 3 | Viewed by 1402
Abstract
Assume that ξ and η are two independent random variables with distribution functions Fξ and Fη, respectively. The distribution of a random variable ξη, denoted by FξFη, is called the product-convolution of [...] Read more.
Assume that ξ and η are two independent random variables with distribution functions Fξ and Fη, respectively. The distribution of a random variable ξη, denoted by FξFη, is called the product-convolution of Fξ and Fη. It is proved that FξFη is a generalized subexponential distribution if Fξ belongs to the class of generalized subexponential distributions and η is nonnegative and not degenerated at zero. Full article
(This article belongs to the Special Issue Probabilistic Models in Insurance and Finance)
23 pages, 1850 KiB  
Article
Constrained Nonsingular Terminal Sliding Mode Attitude Control for Spacecraft: A Funnel Control Approach
by Nguyen Xuan-Mung, Mehdi Golestani and Sung Kyung Hong
Mathematics 2023, 11(1), 247; https://doi.org/10.3390/math11010247 - 3 Jan 2023
Cited by 8 | Viewed by 2033
Abstract
This paper presents an adaptive constrained attitude control for uncertain spacecraft. Inspired by the concept of nonsingular terminal sliding mode control and funnel control for nonlinear systems, a novel adaptive attitude control is introduced which contains a time-varying gain to handle the constraints [...] Read more.
This paper presents an adaptive constrained attitude control for uncertain spacecraft. Inspired by the concept of nonsingular terminal sliding mode control and funnel control for nonlinear systems, a novel adaptive attitude control is introduced which contains a time-varying gain to handle the constraints imposed on the spacecraft attitude. Indeed, when the attitude trajectory approaches the boundary of the constraint set, the control effort as well as the time-varying gain will increase in order to preclude the trajectory from intersecting the boundary. Then, it is analytically proved that the system trajectories converge to an arbitrary small region around the origin within a fixed time where the smallest upper bound of the convergence time is determined as an independent parameter in the controller. Further, the proposed control scheme is nonsingular without having to use any piecewise continuous function which simplifies stability analysis. These properties distinguish the proposed control scheme from the existing finite/fixed-time attitude controls. Finally, several simulation results confirm the robustness and performance of the proposed control framework. Full article
(This article belongs to the Topic Dynamical Systems: Theory and Applications)
Show Figures

Figure 1

Figure 1
<p>Coordinate reference frames. [<a href="#B28-mathematics-11-00247" class="html-bibr">28</a>].</p>
Full article ">Figure 2
<p>Comparison of <math display="inline"><semantics> <mrow> <msup> <mrow> <mo>|</mo> <mi>x</mi> <mo>|</mo> </mrow> <mrow> <mn>0.7</mn> </mrow> </msup> <mi>sgn</mi> <mrow> <mo>(</mo> <mi>x</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> and <span class="html-italic">x</span>, <math display="inline"><semantics> <mrow> <mi>sgn</mi> <mo>(</mo> <mi>x</mi> <mo>)</mo> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>x</mi> <mo>|</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>The diagram of the novel NN-based control for the rigid spacecraft attitude system.</p>
Full article ">Figure 4
<p>Time responses of the attitude in Part 1 for different initial conditions.</p>
Full article ">Figure 5
<p>Steady state behavior of the attitude in Part 1 for different initial conditions.</p>
Full article ">Figure 6
<p>Time responses of the rotation velocity in Part 1 for different initial conditions.</p>
Full article ">Figure 7
<p>Steady state behavior of the rotation velocity in Part 1 for different initial conditions.</p>
Full article ">Figure 8
<p>The parameter <math display="inline"><semantics> <mi>λ</mi> </semantics></math> in Part 1 for different initial conditions.</p>
Full article ">Figure 9
<p>The parameter <math display="inline"><semantics> <mi>γ</mi> </semantics></math> in Part 1 for different initial conditions.</p>
Full article ">Figure 10
<p>The control torque in Part 1 for different initial conditions.</p>
Full article ">Figure 11
<p>Steady state behavior of the control torque in Part 1 for different initial conditions.</p>
Full article ">Figure 12
<p>Time responses of the attitude in Part 2 for different <math display="inline"><semantics> <mi>ϑ</mi> </semantics></math>.</p>
Full article ">Figure 13
<p>Time responses of the rotation velocity in Part 2 for different <math display="inline"><semantics> <mi>ϑ</mi> </semantics></math>.</p>
Full article ">Figure 14
<p>The control torque in Part 2 for different <math display="inline"><semantics> <mi>ϑ</mi> </semantics></math>.</p>
Full article ">Figure 15
<p>The attitude in Part 3: (<b>a</b>) noisy measurement, (<b>b</b>) high-frequency disturbance.</p>
Full article ">Figure 16
<p>The attitude in Part 3 in steady state: (<b>a</b>) noisy measurement, (<b>b</b>) high-frequency disturbance.</p>
Full article ">Figure 17
<p>The rotation velocity in Part 3: (<b>a</b>) noisy measurement, (<b>b</b>) high-frequency disturbance.</p>
Full article ">Figure 18
<p>The rotation velocity in Part 3 in steady state: (<b>a</b>) noisy measurement, (<b>b</b>) high-frequency disturbance.</p>
Full article ">Figure 19
<p>The control torque in Part 3: (<b>a</b>) noisy measurement, (<b>b</b>) high-frequency disturbance.</p>
Full article ">
26 pages, 562 KiB  
Article
Non-Parametric Non-Inferiority Assessment in a Three-Arm Trial with Non-Ignorable Missing Data
by Wei Li, Yunqi Zhang and Niansheng Tang
Mathematics 2023, 11(1), 246; https://doi.org/10.3390/math11010246 - 3 Jan 2023
Viewed by 1967
Abstract
A three-arm non-inferiority trial including a placebo is usually utilized to assess the non-inferiority of an experimental treatment to a reference treatment. Existing methods for assessing non-inferiority mainly focus on the fully observed endpoints. However, in some clinical trials, treatment endpoints may be [...] Read more.
A three-arm non-inferiority trial including a placebo is usually utilized to assess the non-inferiority of an experimental treatment to a reference treatment. Existing methods for assessing non-inferiority mainly focus on the fully observed endpoints. However, in some clinical trials, treatment endpoints may be subject to missingness for various reasons, such as the refusal of subjects or their migration. To address this issue, this paper aims to develop a non-parametric approach to assess the non-inferiority of an experimental treatment to a reference treatment in a three-arm trial with non-ignorable missing endpoints. A logistic regression is adopted to specify a non-ignorable missingness data mechanism. A semi-parametric imputation method is proposed to estimate parameters in the considered logistic regression. Inverse probability weighting, augmented inverse probability weighting and non-parametric methods are developed to estimate treatment efficacy for known and unknown parameters in the considered logistic regression. Under some regularity conditions, we show asymptotic normality of the constructed estimators for treatment efficacy. A bootstrap resampling method is presented to estimate asymptotic variances of the estimated treatment efficacy. Three Wald-type statistics are constructed to test the non-inferiority based on the asymptotic properties of the estimated treatment efficacy. Empirical studies show that the proposed Wald-type test procedure is robust to the misspecified missingness data mechanism, and behaves better than the complete-case method in the sense that the type I error rates for the former are closer to the pre-given significance level than those for the latter. Full article
(This article belongs to the Special Issue Statistical Methods in Data Science and Applications)
Show Figures

Figure 1

Figure 1
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against the sample size <span class="html-italic">n</span> under balanced design with missingness data mechanism models E1 (<b>left panel</b>), E2 (<b>left second panel</b>), E3 (<b>right second panel</b>) and E4 (<b>right panel</b>) for <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against the sample size <span class="html-italic">n</span> under unbalanced design (i.e., <math display="inline"><semantics> <msub> <mi>n</mi> <mi>E</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>R</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>P</mi> </msub> </semantics></math> = 2:1:1), with missingness data mechanism models E1 (<b>left panel</b>), E2 (<b>left second panel</b>), E3 (<b>right second panel</b>) and E4 (<b>right panel</b>) for <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure A1
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against <span class="html-italic">a</span> for missingness data mechanism model E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics></math> (the first row), 100 (middle row) and 150 (the last row) under the balanced designs.</p>
Full article ">Figure A2
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against <span class="html-italic">a</span> for missingness data mechanism models E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <span class="html-italic">N</span> = 120 (the first row), 200 (middle row) and 280 (the last row) under the unbalanced designs with <math display="inline"><semantics> <msub> <mi>n</mi> <mi>E</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>R</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>P</mi> </msub> </semantics></math> = 2:1:1.</p>
Full article ">Figure A3
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against the sample size <span class="html-italic">n</span> for missingness data mechanism models E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math> (upper row) and 0.6 (lower row) under balanced design.</p>
Full article ">Figure A4
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against the sample size <span class="html-italic">n</span> for missingness data mechanism models E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.4</mn> </mrow> </semantics></math> (upper row) and 0.6 (lower row) under unbalanced design (<math display="inline"><semantics> <msub> <mi>n</mi> <mi>E</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>R</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>P</mi> </msub> </semantics></math> = 2:1:1).</p>
Full article ">Figure A5
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against treatment effect <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>E</mi> <mn>1</mn> </mrow> </msub> </semantics></math> for missingness data mechanism models E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>a</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> = (0.2,80) (the first row), (0.2,120) (the second row), (0.6,80) (the third row) and (0.6,120) (the last row) under the balanced designs.</p>
Full article ">Figure A5 Cont.
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against treatment effect <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>E</mi> <mn>1</mn> </mrow> </msub> </semantics></math> for missingness data mechanism models E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>a</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> = (0.2,80) (the first row), (0.2,120) (the second row), (0.6,80) (the third row) and (0.6,120) (the last row) under the balanced designs.</p>
Full article ">Figure A6
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against treatment effect <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>E</mi> <mn>1</mn> </mrow> </msub> </semantics></math> for missingness data mechanism models E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>a</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> = (0.2,200) (the first row), (0.2,320) (the second row), (0.6,200) (the third row), and (0.6,320) (the last row) under the unbalanced designs with <math display="inline"><semantics> <msub> <mi>n</mi> <mi>E</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>R</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>P</mi> </msub> </semantics></math> = 2:1:1.</p>
Full article ">Figure A6 Cont.
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against treatment effect <math display="inline"><semantics> <msub> <mi>α</mi> <mrow> <mi>E</mi> <mn>1</mn> </mrow> </msub> </semantics></math> for missingness data mechanism models E1 (left panel), E2 (left second panel), E3 (right second panel) and E4 (right panel) for <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>a</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> = (0.2,200) (the first row), (0.2,320) (the second row), (0.6,200) (the third row), and (0.6,320) (the last row) under the unbalanced designs with <math display="inline"><semantics> <msub> <mi>n</mi> <mi>E</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>R</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>P</mi> </msub> </semantics></math> = 2:1:1.</p>
Full article ">Figure A7
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against <math display="inline"><semantics> <mi>γ</mi> </semantics></math> for missingness data mechanism models E2 (the first row), E3 (the middle row) and E4 (the last row) together with <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>a</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> = (0.2,80), (0.2,120), (0.6,80) and (0.6,120), respectively, under the balanced designs.</p>
Full article ">Figure A8
<p>SHT, SRI, SAI and CC represent empirical powers evaluated from IPW, regression imputation, AIPW and CC methods against <math display="inline"><semantics> <mi>γ</mi> </semantics></math> for missingness data mechanism models E2 (the first row), E3 (the middle row) and E4 (the last row) together with <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>a</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> = (0.2,200), (0.2,320), (0.6,200) and (0.6,320), respectively, under the unbalanced designs with <math display="inline"><semantics> <msub> <mi>n</mi> <mi>E</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>R</mi> </msub> </semantics></math>:<math display="inline"><semantics> <msub> <mi>n</mi> <mi>P</mi> </msub> </semantics></math> = 2:1:1.</p>
Full article ">
12 pages, 1642 KiB  
Article
CNN-Based Temporal Video Segmentation Using a Nonlinear Hyperbolic PDE-Based Multi-Scale Analysis
by Tudor Barbu
Mathematics 2023, 11(1), 245; https://doi.org/10.3390/math11010245 - 3 Jan 2023
Cited by 3 | Viewed by 1737
Abstract
An automatic temporal video segmentation framework is introduced in this article. The proposed cut detection technique performs a high-level feature extraction on the video frames, by applying a multi-scale image analysis approach combining nonlinear partial differential equations (PDE) to convolutional neural networks (CNN). [...] Read more.
An automatic temporal video segmentation framework is introduced in this article. The proposed cut detection technique performs a high-level feature extraction on the video frames, by applying a multi-scale image analysis approach combining nonlinear partial differential equations (PDE) to convolutional neural networks (CNN). A nonlinear second-order hyperbolic PDE model is proposed and its well-posedness is then investigated rigorously here. Its weak and unique solution is determined numerically applying a finite difference method-based numerical approximation algorithm that quickly converges to it. A scale-space representation is then created using that iterative discretization scheme. A CNN-based feature extraction is performed at each scale and the feature vectors obtained at multiple scales are concatenated into a final frame descriptor. The feature vector distance values between any two successive frames are then determined and the video transitions are identified next, by applying an automatic clustering scheme on these values. The proposed PDE model, its mathematical investigation and discretization, and the multi-scale analysis based on it represent the major contributions of this work. Some temporal segmentation experiments and method comparisons that illustrate the effectiveness of the proposed framework are finally described in this research paper. Full article
Show Figures

Figure 1

Figure 1
<p>Inception-ResNet-V2 architecture.</p>
Full article ">Figure 2
<p>DenseNet-201 architecture.</p>
Full article ">Figure 3
<p>A temporal video segmentation example: (<b>a</b>–<b>h</b>) the pairs of frames related to the shot cuts; (<b>i</b>) the frame feature vector distance values (the <span class="html-italic">highest</span> ones indicate the cuts).</p>
Full article ">
14 pages, 17667 KiB  
Article
Multiaxial Strength Criterion Model of Concrete Based on Random Forest
by Xingqiao Chen, Dongjian Zheng, Yongtao Liu, Xin Wu, Haifeng Jiang and Jianchun Qiu
Mathematics 2023, 11(1), 244; https://doi.org/10.3390/math11010244 - 3 Jan 2023
Cited by 3 | Viewed by 1697
Abstract
The concrete strength criterion is the basis of strength analysis and evaluation under a complex stress state. In this paper, a large number of multiaxial strength tests were carried out, and many mathematical expressions of strength criteria were proposed based on the geometric [...] Read more.
The concrete strength criterion is the basis of strength analysis and evaluation under a complex stress state. In this paper, a large number of multiaxial strength tests were carried out, and many mathematical expressions of strength criteria were proposed based on the geometric characteristics and the assumption of a convex function. However, the rationality of the assumption of a convex function limits the use of these strength criteria. In particular, misjudgment will occur near the failure curve surface. Therefore, this paper does not assume the shape function of the criterion in advance. By collecting experimental data and using a machine learning method, it proposes a method of hidden function of failure curve surface. Based on 777 groups of experimental data, the random forest (RF), the back propagation neural network (BP) and the radial basis neural network (RBF) models were used to analyze and verify the feasibility and effectiveness of the method. Subsequently, the results were compared with the Ottosen strength criterion, the Guo Wang strength criterion and the Drucker–Prager (DP) strength criterion. The results show that the consistency between the strength criterion model established by the machine learning algorithm (especially random forest) and the experimental data is higher than the convex function multiaxis strength criterion of the preset failure surface shape. Moreover, the physical significance is clearer, the deficiency of the convex function failure surface hypothesis is avoided and the established multiaxial strength criterion of concrete is more universal. Full article
(This article belongs to the Special Issue Mathematical Modeling and Numerical Analysis for Applied Sciences)
Show Figures

Figure 1

Figure 1
<p>Failure curve surface.</p>
Full article ">Figure 2
<p>Deviatoric plane.</p>
Full article ">Figure 3
<p>Data distribution of the training and validation sets.</p>
Full article ">Figure 4
<p>Data distribution of the test set.</p>
Full article ">Figure 5
<p>The error of Ottosen (<b>left</b>) and Guo Wang (<b>right</b>) criterion.</p>
Full article ">Figure 6
<p>The error of D-P (<b>left</b>) and B-P (<b>right</b>) criterion.</p>
Full article ">Figure 7
<p>The error of RBF (<b>left</b>) and RF (<b>right</b>) criterion.</p>
Full article ">Figure 8
<p>A 3D view of the failure surface.</p>
Full article ">Figure 9
<p>Deviatoric plane of the RF model.</p>
Full article ">Figure 10
<p>Deviatoric plane of the Ottosen (<b>left</b>) and Guo Wang (<b>right</b>) criterion.</p>
Full article ">Figure 11
<p>Tension and compression meridian.</p>
Full article ">Figure 12
<p>A 3D view of the failure surface.</p>
Full article ">Figure 13
<p>Deviatoric plane of the RF model.</p>
Full article ">Figure 14
<p>Deviatoric plane of the Ottosen (<b>left</b>) and Guo Wang (<b>right</b>) criterion.</p>
Full article ">Figure 15
<p>Tension and compression meridian.</p>
Full article ">
26 pages, 10354 KiB  
Article
Effect of Overburden Depth and Stress Anisotropy on a Ground Reaction Caused by Advancing Excavation of a Circular Tunnel
by Yu-Lin Lee, Ming-Long Zhu, Chi-Huang Ma, Chih-Sheng Chen and Chi-Min Lee
Mathematics 2023, 11(1), 243; https://doi.org/10.3390/math11010243 - 3 Jan 2023
Cited by 1 | Viewed by 2020
Abstract
The assumption of the Convergence–Confinement Method (CCM) is the analysis of the interaction behavior of the support and ground of a deep circular tunnel under an isotropic stress field. Aiming to improve this method, this paper proposes a discussion on the influence of [...] Read more.
The assumption of the Convergence–Confinement Method (CCM) is the analysis of the interaction behavior of the support and ground of a deep circular tunnel under an isotropic stress field. Aiming to improve this method, this paper proposes a discussion on the influence of the overburden depth and stress anisotropy. To consider the influence of the overburden effect, the ground reaction in different depths due to tunnel advancing excavation is investigated. Under anisotropic stress conditions, the analytical solutions of the stress/displacement in the plastic and elastic regions of this ground reaction can also be suitable for theoretical analysis in a consistent manner. The key factor in this study is the use of confinement loss, which can not only describe the simulation of tunnel advancing effects but also become a superimposed value of the incremental procedure. In addition, the calculation spreadsheets can be used to estimate and implement the theoretical analytical solutions into executable computational solutions. To check the validity of the analytical solution, finite element analysis is used to examine the distribution of stress/displacement around the tunnel, especially the distribution along the overburden pressure line in the circular tunnel cross-section. Comparing the analytical solution calculated by the incremental procedure with the result of the numerical analysis shows a consistent trend. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of overburden pressure for initial isotropic/anisotropic stress around a circular tunnel.</p>
Full article ">Figure 2
<p>Schematic diagram of conversion of overburden pressure: (<b>a</b>) the Cartesian coordinate system and (<b>b</b>) the polar coordinate system.</p>
Full article ">Figure 3
<p>Schematic diagram of the stress change around a circular tunnel from the near-field to the far-field stress.</p>
Full article ">Figure 4
<p>Calculation spreadsheet presented by the Explicit Analysis Method (EAM).</p>
Full article ">Figure 5
<p>Drawing results presented by the Explicit Analysis Method (EAM).</p>
Full article ">Figure 6
<p>(<b>a</b>) Assumptions of three different boundary conditions with the initial anisotropic stress in different far-field conditions and (<b>b</b>) finite element mesh and boundary condition.</p>
Full article ">Figure 7
<p>Distribution diagram of initial isotropic stress/displacement (<span class="html-italic">K</span><sub>o</sub> = 1.0) around the tunnel in finite element analysis (<b>a</b>) initial stress before excavation, (<b>b</b>) final stress state after excavation, and (<b>c</b>) total displacement after excavation.</p>
Full article ">Figure 8
<p>Iso-value contour plots of the final stress/displacement distribution around the tunnel under the initial isotropic stress condition (<span class="html-italic">K</span><sub>o</sub> = 1.0) in finite element analysis. (<b>a</b>) Major Principal stress (MPa), (<b>b</b>) Minor Principal stress (MPa), and (<b>c</b>) total displacement (m).</p>
Full article ">Figure 9
<p>Iso-value contour plots of the final stress/displacement distribution around the tunnel under the initial anisotropic stress condition (<span class="html-italic">K</span><sub>o</sub> = 0.8) in finite element analysis. (<b>a</b>) Major Principal stress (MPa), (<b>b</b>) Minor Principal stress (MPa), and (<b>c</b>) total displacement (m).</p>
Full article ">Figure 10
<p>Iso-value contour plots of the final stress/displacement distribution around the tunnel under the initial anisotropic stress condition (<span class="html-italic">K</span><sub>o</sub> = 1.2) in finite element analysis. (<b>a</b>) Major Principal stress (MPa), (<b>b</b>) Minor Principal stress (MPa), and (<b>c</b>) total displacement (m).</p>
Full article ">Figure 11
<p>Ground reaction around the tunnel obtained by EAM and FEM with the different incremental values of <span class="html-italic">λ</span> in an elastic media, and the distribution of (<b>a</b>) radial stress, (<b>b</b>) tangential stress, (<b>c</b>) radial displacement, and (<b>d</b>) tangential and radial stresses with <span class="html-italic">λ</span> = 1.0 (Case II and <span class="html-italic">K</span><sub>o</sub> = 0.8).</p>
Full article ">Figure 12
<p>Ground reaction around the tunnel obtained by EAM and FEM with the different incremental values <span class="html-italic">λ</span> in an elastoplastic media, and the distribution of (<b>a</b>) radial stress, (<b>b</b>) tangential stress, (<b>c</b>) radial displacement, and (<b>d</b>) tangential and radial stresses with <span class="html-italic">λ</span> = 1.0 (Case II and <span class="html-italic">K</span><sub>o</sub> = 0.8).</p>
Full article ">Figure 13
<p>Comparison of the ground reaction around a circular tunnel in Case II (<span class="html-italic">θ</span> = 90°) between the EAM and FEM with <span class="html-italic">λ</span> = 1.0, the distribution of tangential and radial stresses for (<b>a</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastic media, (<b>b</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastoplastic media, (<b>c</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastic media, (<b>d</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastoplastic media, (<b>e</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastic media, and (<b>f</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastoplastic media.</p>
Full article ">Figure 13 Cont.
<p>Comparison of the ground reaction around a circular tunnel in Case II (<span class="html-italic">θ</span> = 90°) between the EAM and FEM with <span class="html-italic">λ</span> = 1.0, the distribution of tangential and radial stresses for (<b>a</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastic media, (<b>b</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastoplastic media, (<b>c</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastic media, (<b>d</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastoplastic media, (<b>e</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastic media, and (<b>f</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastoplastic media.</p>
Full article ">Figure 14
<p>Ground reaction around the tunnel obtained by EAM and FEM with the different incremental values of <span class="html-italic">λ</span> in an elastic media, and the distribution of (<b>a</b>) radial stress, (<b>b</b>) tangential stress, (<b>c</b>) radial displacement, and (<b>d</b>) tangential and radial stresses with <span class="html-italic">λ</span> = 1.0 (Case I, <span class="html-italic">θ</span> = 0°, along the ground surface line and <span class="html-italic">K</span><sub>o</sub> = 0.8).</p>
Full article ">Figure 14 Cont.
<p>Ground reaction around the tunnel obtained by EAM and FEM with the different incremental values of <span class="html-italic">λ</span> in an elastic media, and the distribution of (<b>a</b>) radial stress, (<b>b</b>) tangential stress, (<b>c</b>) radial displacement, and (<b>d</b>) tangential and radial stresses with <span class="html-italic">λ</span> = 1.0 (Case I, <span class="html-italic">θ</span> = 0°, along the ground surface line and <span class="html-italic">K</span><sub>o</sub> = 0.8).</p>
Full article ">Figure 15
<p>Ground reaction around the tunnel obtained by EAM and FEM with the different incremental values <span class="html-italic">λ</span> in an elastoplastic media, and the distribution of (<b>a</b>) radial stress, (<b>b</b>) tangential stress, (<b>c</b>) radial displacement, and (<b>d</b>) tangential and radial stresses with <span class="html-italic">λ</span> = 1.0 (Case I, <span class="html-italic">θ</span> = 0°, along the ground surface line and <span class="html-italic">K</span><sub>o</sub> = 0.8).</p>
Full article ">Figure 16
<p>Ground reaction around the tunnel obtained by EAM and FEM with the different incremental values <span class="html-italic">λ</span> in an elastic media, and the distribution of (<b>a</b>) radial stress, (<b>b</b>) tangential stress, (<b>c</b>) radial displacement, and (<b>d</b>) tangential and radial stresses with <span class="html-italic">λ</span> = 1.0 (Case III, <span class="html-italic">θ</span> = 180°, along the deep line and <span class="html-italic">K</span><sub>o</sub> = 0.8).</p>
Full article ">Figure 17
<p>Ground reaction around the tunnel obtained by EAM and FEM with the different incremental values <span class="html-italic">λ</span> in an elastoplastic media, and the distribution of (<b>a</b>) radial stress, (<b>b</b>) tangential stress, (<b>c</b>) radial displacement, and (<b>d</b>) tangential and radial stresses with <span class="html-italic">λ</span> = 1.0 (Case III, <span class="html-italic">θ</span> = 180°, along the deep line and <span class="html-italic">K</span><sub>o</sub> = 0.8).</p>
Full article ">Figure 18
<p>Ground reaction around the tunnel obtained by EAM and FEM in Case I (<span class="html-italic">θ</span> = 0°) and Case III (<span class="html-italic">θ</span> = 180°) with <span class="html-italic">λ</span> = 1.0 and <span class="html-italic">K</span><sub>o</sub> = 0.8, and the distribution of (<b>a</b>) radial stress in the elastic media, (<b>b</b>) tangential stress in the elastic media, (<b>c</b>) radial stress in the elastoplastic media, and (<b>d</b>) tangential stress in the elastoplastic media.</p>
Full article ">Figure 19
<p>Ground reaction around the tunnel obtained by EAM and FEM in Case I (<span class="html-italic">θ</span> = 0°) and Case III (<span class="html-italic">θ</span> = 180°) with <span class="html-italic">λ</span> = 1.0 and <span class="html-italic">K</span><sub>o</sub> = 0.8, and the distribution of radial displacements (<b>a</b>) in the elastic media, and (<b>b</b>) in the elastoplastic media.</p>
Full article ">Figure 20
<p>Ground reaction around the tunnel obtained by EAM and FEM in Case I (<span class="html-italic">θ</span> = 0°) with <span class="html-italic">λ</span> = 1.0, and the distribution of tangential and radial stresses for (<b>a</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastic media, (<b>b</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastoplastic media, (<b>c</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastic media, (<b>d</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastoplastic media, (<b>e</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastic media, and (<b>f</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastoplastic media.</p>
Full article ">Figure 21
<p>Ground reaction around the tunnel obtained by EAM and FEM in Case I (<span class="html-italic">θ</span> = 180°) with <span class="html-italic">λ</span> = 1.0, and the distribution of tangential and radial stresses for (<b>a</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastic media, (<b>b</b>) <span class="html-italic">K</span><sub>o</sub> = 1.0 in the elastoplastic media, (<b>c</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastic media, (<b>d</b>) <span class="html-italic">K</span><sub>o</sub> = 0.8 in the elastoplastic media, (<b>e</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastic media, and (<b>f</b>) <span class="html-italic">K</span><sub>o</sub> = 1.2 in the elastoplastic media.</p>
Full article ">Figure 22
<p>Ground reaction around the tunnel in the elastic media simulated by the EAM with <span class="html-italic">λ</span> = 1.0, and the distribution of (<b>a</b>) tangential stress and (<b>b</b>) radial displacement.</p>
Full article ">Figure 23
<p>Ground reaction around the tunnel in the elastoplastic media simulated by the EAM with <span class="html-italic">λ</span> = 1.0, and the distribution of (<b>a</b>) plastic radius and (<b>b</b>) radial displacement.</p>
Full article ">
16 pages, 604 KiB  
Article
Adaptive Hyperparameter Fine-Tuning for Boosting the Robustness and Quality of the Particle Swarm Optimization Algorithm for Non-Linear RBF Neural Network Modelling and Its Applications
by Zohaib Ahmad, Jianqiang Li and Tariq Mahmood
Mathematics 2023, 11(1), 242; https://doi.org/10.3390/math11010242 - 3 Jan 2023
Cited by 15 | Viewed by 2503
Abstract
A method is proposed for recognizing and predicting non-linear systems employing a radial basis function neural network (RBFNN) and robust hybrid particle swarm optimization (HPSO) approach. A PSO is coupled with a spiral-shaped mechanism (HPSO-SSM) to optimize the PSO performance by mitigating its [...] Read more.
A method is proposed for recognizing and predicting non-linear systems employing a radial basis function neural network (RBFNN) and robust hybrid particle swarm optimization (HPSO) approach. A PSO is coupled with a spiral-shaped mechanism (HPSO-SSM) to optimize the PSO performance by mitigating its constraints, such as sluggish convergence and the local minimum dilemma. Three advancements are incorporated into the hypothesized HPSO-SSM algorithms to achieve remarkable results. First, the diversity of the search process is promoted to update the inertial weight ω based on the logistic map sequence. Then, two distinct parameters are trained in the original position update algorithm to enhance the work efficiency of the successive generation. Finally, the proposed approach employs a spiral-shaped mechanism as a local search operator inside the optimum solution space. Moreover, the HPSO-SSM method concurrently improves the RBFNN parameters and network size, building a model with a compact configuration and higher precision. Two non-linear benchmark functions and the total phosphorus (TP) modelling issue in a waste water treatment process (WWTP) are utilized to assess the overall efficacy of the creative technique. The results of testing indicate that the projected HPSO-SSM-RBFNN algorithm performed very effectively. Full article
(This article belongs to the Special Issue Mathematical Methods for Nonlinear Dynamics)
Show Figures

Figure 1

Figure 1
<p>Step-wise description of the suggested HPSO-SSM algorithm.</p>
Full article ">Figure 2
<p>The multi-layer architecture of RBFNN algorithms comprises an input layer, hidden layer, and output layer.</p>
Full article ">Figure 3
<p>The presented approach’s efficacy is measured in terms of (<b>a</b>) comparison of hidden neurons for the training of proposed and other conventional algorithms, (<b>b</b>) RMSE values during the training phase, (<b>c</b>) predicted outcomes of HPSO-SSM-RBFNN during the testing phase, (<b>d</b>) the prediction errors during the testing phase.</p>
Full article ">Figure 4
<p>The presented approach’s efficacy is measured in terms of (<b>a</b>) the number of hidden neurons during training, (<b>b</b>) RMSE values in the training phase, (<b>c</b>) the predicted results by HPSO-SSM-RBFNN during the testing phase, (<b>d</b>) prediction errors during the testing phase.</p>
Full article ">Figure 5
<p>The presented approach’s efficacy is measured in terms of (<b>a</b>) neurons buried during training, (<b>b</b>) the RMSE values in the training phase, (<b>c</b>) prediction results during the testing phase, (<b>d</b>) the proposed HPSO-SSM-RBFNN for total phosphorus (TP) prediction in WWTP.</p>
Full article ">
21 pages, 360 KiB  
Article
Efficiency and Competitiveness of the Equatorial Guinean Financial Sector
by Tito Ondo Ela-Medja and Pilar Alberca
Mathematics 2023, 11(1), 241; https://doi.org/10.3390/math11010241 - 3 Jan 2023
Viewed by 1854
Abstract
The private sector, in order to function properly, needs financing from the national financial sector, and so the efficiency and competitiveness of said financial sector arouse the interest of many researchers, who perform analyses in order to provide authorities and decision makers with [...] Read more.
The private sector, in order to function properly, needs financing from the national financial sector, and so the efficiency and competitiveness of said financial sector arouse the interest of many researchers, who perform analyses in order to provide authorities and decision makers with relevant information for the decision-making process and the design of their financial policies. This study contributes to this line of research, analyzing both technical and economic efficiency (allocative and cost efficiency) in the financial sector, focusing on banks, using a sample of Equatorial Guinean firms during the period of 2013–2019. Furthermore, the competitiveness of the financial sector is also analyzed. Knowing how efficient and competitive the financial sector is could answer many of the questions that arise when regulating the national business sector. To carry out this analysis, parametric approaches such as stochastic frontiers and non-parametric techniques such as data envelopment analysis are used, as well as different competitiveness indicators (Boone, Panzar–Rosse). During the research, it is found that the banking sector, which represents the financial sector of the country, operates with low levels of technical efficiency: the Cobb–Douglas production function and the trans-logarithmic production function showed similar average efficiency results. Regarding competitiveness, the financial sector operates under monopolistic competition. Therefore, much remains to be achieved to improve the efficiency and competitiveness of the financial sector for the development of Equatorial Guinea. It is the responsibility of economic agents to provide a good business climate in the country and guarantee perfect competition in the financial market to promote national development. Full article
18 pages, 319 KiB  
Article
Geometry of Tangent Poisson–Lie Groups
by Ibrahim Al-Dayel, Foued Aloui and Sharief Deshmukh
Mathematics 2023, 11(1), 240; https://doi.org/10.3390/math11010240 - 3 Jan 2023
Viewed by 1528
Abstract
Let G be a Poisson–Lie group equipped with a left invariant contravariant pseudo-Riemannian metric. There are many ways to lift the Poisson structure on G to the tangent bundle TG of G. In this paper, we induce a left invariant contravariant [...] Read more.
Let G be a Poisson–Lie group equipped with a left invariant contravariant pseudo-Riemannian metric. There are many ways to lift the Poisson structure on G to the tangent bundle TG of G. In this paper, we induce a left invariant contravariant pseudo-Riemannian metric on the tangent bundle TG, and we express in different cases the contravariant Levi-Civita connection and curvature of TG in terms of the contravariant Levi-Civita connection and the curvature of G. We prove that the space of differential forms Ω*(G) on G is a differential graded Poisson algebra if, and only if, Ω*(TG) is a differential graded Poisson algebra. Moreover, we show that G is a pseudo-Riemannian Poisson–Lie group if, and only if, the Sanchez de Alvarez tangent Poisson–Lie group TG is also a pseudo-Riemannian Poisson–Lie group. Finally, some examples of pseudo-Riemannian tangent Poisson–Lie groups are given. Full article
(This article belongs to the Special Issue Geometry of Manifolds and Applications)
17 pages, 888 KiB  
Article
The ISM Method to Analyze the Relationship between Blockchain Adoption Criteria in University: An Indonesian Case
by Vincent F. Yu, Achmad Bahauddin, Putro F. Ferdinant, Agustina Fatmawati and Shih-Wei Lin
Mathematics 2023, 11(1), 239; https://doi.org/10.3390/math11010239 - 3 Jan 2023
Cited by 6 | Viewed by 1896
Abstract
Referring to the widespread problem of diploma forgery in Indonesian educational institutions as the impetus for UNTIRTA’s latest vision as an “Integrated, Smart, and Green University,” UNTIRTA intends to use blockchain technology to prevent diploma forgery and overcome issues related to existing platforms [...] Read more.
Referring to the widespread problem of diploma forgery in Indonesian educational institutions as the impetus for UNTIRTA’s latest vision as an “Integrated, Smart, and Green University,” UNTIRTA intends to use blockchain technology to prevent diploma forgery and overcome issues related to existing platforms at UNTIRTA, such as frequent connection interruptions when accessed by a large number of users simultaneously. Before using blockchain technology, UNTIRTA must evaluate several readiness issues. This study presented the interpretative structural modeling (ISM) method to assess the primary preparedness elements for adopting blockchain technology in universities and sought to provide pertinent strategy ideas for UNTIRTA’s blockchain technology application. The results reveal sixteen major parameters that influence the adoption readiness of blockchain technology at UNTIRTA. The primary variables impacting the adoption and deployment of blockchain technology at UNTIRTA are management and employee support and a grasp of the technology. To realize UNTIRTA’s mission as an “Integrated, Smart, and Green University”, the proposed method entails determining an initial agreement in which all stakeholders have a shared understanding and commitment to Blockchain technology implementation at UNTIRTA. The objective of the tactical proposal is to establish each unit’s mission in the blockchain implementation program. The objective of the technical proposal is to construct a planning document that will serve as a coordination tool between the chairman and members, as well as all parties interested in the adoption of Blockchain technology at UNTIRTA. Full article
(This article belongs to the Section Engineering Mathematics)
Show Figures

Figure 1

Figure 1
<p>Proposed method to determine the main readiness factors for blockchain adoption in a university.</p>
Full article ">Figure 2
<p>Interpretive structural modeling-based influence diagram for the blockchain adoption criteria in university.</p>
Full article ">Figure 3
<p>The MICMAC Analysis Diagram.</p>
Full article ">
18 pages, 320 KiB  
Article
Perov Fixed-Point Results on F-Contraction Mappings Equipped with Binary Relation
by Fahim Ud Din, Muhammad Din, Umar Ishtiaq and Salvatore Sessa
Mathematics 2023, 11(1), 238; https://doi.org/10.3390/math11010238 - 3 Jan 2023
Cited by 4 | Viewed by 1591
Abstract
The purpose of this article is to discuss some new aspects of the vector-valued metric space. The idea of an arbitrary binary relation along with the well-known F contraction is used to demonstrate the existence of fixed points in the context of a [...] Read more.
The purpose of this article is to discuss some new aspects of the vector-valued metric space. The idea of an arbitrary binary relation along with the well-known F contraction is used to demonstrate the existence of fixed points in the context of a complete vector-valued metric space for both single- and multi-valued mappings. Utilizing the idea of binary relation, and with the help of F contraction, this work extends and complements some of the very recently established Perov-type fixed-point results in the literature. Furthermore, this work includes examples to justify the validity of the given results. During the discussion, it was found that some of the renowned metrical results proven by several authors using different binary relations, such as partial order, pre-order, transitive relation, tolerance, strict order and symmetric closure, can be weakened by using an arbitrary binary relation. Full article
(This article belongs to the Section Mathematics and Computer Science)
13 pages, 1804 KiB  
Article
Mapping between Spin-Glass Three-Dimensional (3D) Ising Model and Boolean Satisfiability Problem
by Zhidong Zhang
Mathematics 2023, 11(1), 237; https://doi.org/10.3390/math11010237 - 3 Jan 2023
Cited by 11 | Viewed by 4950
Abstract
The common feature for a nontrivial hard problem is the existence of nontrivial topological structures, non-planarity graphs, nonlocalities, or long-range spin entanglements in a model system with randomness. For instance, the Boolean satisfiability (K-SAT) problems for K ≥ 3 [...] Read more.
The common feature for a nontrivial hard problem is the existence of nontrivial topological structures, non-planarity graphs, nonlocalities, or long-range spin entanglements in a model system with randomness. For instance, the Boolean satisfiability (K-SAT) problems for K ≥ 3 MSATK3  are nontrivial, due to the existence of non-planarity graphs, nonlocalities, and the randomness. In this work, the relation between a spin-glass three-dimensional (3D) Ising model  MSGI3D  with the lattice size N = mnl and the K-SAT problems is investigated in detail. With the Clifford algebra representation, it is easy to reveal the existence of the long-range entanglements between Ising spins in the spin-glass 3D Ising lattice. The internal factors in the transfer matrices of the spin-glass 3D Ising model lead to the nontrivial topological structures and the nonlocalities. At first, we prove that the absolute minimum core (AMC) model MAMC3D exists in the spin-glass 3D Ising model, which is defined as a spin-glass 2D Ising model interacting with its nearest neighboring plane. Any algorithms, which use any approximations and/or break the long-range spin entanglements of the AMC model, cannot result in the exact solution of the spin-glass 3D Ising model. Second, we prove that the dual transformation between the spin-glass 3D Ising model and the spin-glass 3D Z2 lattice gauge model shows that it can be mapped to a K-SAT problem for K ≥ 4 also in the consideration of random interactions and frustrations. Third, we prove that the AMC model is equivalent to the K-SAT problem for K = 3. Because the lower bound of the computational complexity of the spin-glass 3D Ising model CLMSGI3D  is the computational complexity by brute force search of the AMC model CUMAMC3D, the lower bound of the computational complexity of the K-SAT problem for K ≥ 4 CLMSATK4  is the computational complexity by brute force search of the K-SAT problem for K = 3  CUMSATK=3. Namely, CLMSATK4=CLMSGI3DCUMAMC3D=CUMSATK=3. All of them are in subexponential and superpolynomial. Therefore, the computational complexity of the K-SAT problem for K ≥ 4 cannot be reduced to that of the K-SAT problem for K < 3. Full article
Show Figures

Figure 1

Figure 1
<p>Duality between the 3D Ising model and the 3D Z<sub>2</sub> lattice gauge model.</p>
Full article ">Figure 2
<p>Mapping between a two-spin interaction for a link in the 3D Ising model and a four-spin interaction for a plaquette in the 3D Z<sub>2</sub> lattice gauge model.</p>
Full article ">Figure 3
<p>Equivalence between three interactions in the AMC model and those in a star lattice and the duality to a triangular lattice.</p>
Full article ">Figure 4
<p>Mapping between a two-spin interaction for a link in a star lattice (i.e., the AMC model) and a three-spin interaction for a triangle in a triangular lattice.</p>
Full article ">
19 pages, 1839 KiB  
Article
Machine-Learning Methods on Noisy and Sparse Data
by Konstantinos Poulinakis, Dimitris Drikakis, Ioannis W. Kokkinakis and Stephen Michael Spottswood
Mathematics 2023, 11(1), 236; https://doi.org/10.3390/math11010236 - 3 Jan 2023
Cited by 35 | Viewed by 6309
Abstract
Experimental and computational data and field data obtained from measurements are often sparse and noisy. Consequently, interpolating unknown functions under these restrictions to provide accurate predictions is very challenging. This study compares machine-learning methods and cubic splines on the sparsity of training data [...] Read more.
Experimental and computational data and field data obtained from measurements are often sparse and noisy. Consequently, interpolating unknown functions under these restrictions to provide accurate predictions is very challenging. This study compares machine-learning methods and cubic splines on the sparsity of training data they can handle, especially when training samples are noisy. We compare deviation from a true function f using the mean square error, signal-to-noise ratio and the Pearson R2 coefficient. We show that, given very sparse data, cubic splines constitute a more precise interpolation method than deep neural networks and multivariate adaptive regression splines. In contrast, machine-learning models are robust to noise and can outperform splines after a training data threshold is met. Our study aims to provide a general framework for interpolating one-dimensional signals, often the result of complex scientific simulations or laboratory experiments. Full article
(This article belongs to the Special Issue Mathematical Modeling, Optimization and Machine Learning)
Show Figures

Figure 1

Figure 1
<p>Various engineering applications are featuring acoustic-wall effects and vibration induced by aerodynamic loading: high-speed aircraft, turbomachinery, wind turbines, and high-speed trains.</p>
Full article ">Figure 2
<p>SDNN architecture visualized. A 10-layer network, with hidden layers consisting of 20 neurons each. The leaky ReLU activation function is used on every layer. The total number of learnable parameters is 3421.</p>
Full article ">Figure 3
<p>Training scenario with noise p = 10% and N = 100 training data points. Data is sampled linearly from <math display="inline"><semantics> <msubsup> <mi>f</mi> <mn>1</mn> <mo>*</mo> </msubsup> </semantics></math> in the <math display="inline"><semantics> <mrow> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>5</mn> <mo>]</mo> </mrow> </semantics></math> range, and then the noise is added. Training noisy data is on the left, while noiseless test data is on the right.</p>
Full article ">Figure 4
<p>Boxplots for MSE and SNR values attained from all experiments. The average of five runs is presented. The first row shows the MSE for the SDNN, LDNN, splines and MARS test sets. The second row shows the respective SNR values. The box represents the 1st and 3rd quantiles, while the middle line represents the median value. The left vertical line represents the value <math display="inline"><semantics> <mrow> <mi>Q</mi> <mn>1</mn> <mo> </mo> <mo>−</mo> <mo> </mo> <mn>1.5</mn> <mspace width="0.166667em"/> <mi>I</mi> <mi>Q</mi> <mi>R</mi> </mrow> </semantics></math>, while the right line is <math display="inline"><semantics> <mrow> <mi>Q</mi> <mn>3</mn> <mo> </mo> <mo>+</mo> <mo> </mo> <mn>1.5</mn> <mspace width="0.166667em"/> <mi>I</mi> <mi>Q</mi> <mi>R</mi> </mrow> </semantics></math>. Values outside of the vertical lines are outliers.</p>
Full article ">Figure 5
<p>Test mean squared error vs. noise level (0%, 1%, 5%, 10%) for eight different levels of sparsity (sample training points). The average values over five runs are presented. Blue represents SDNN, red LDNN, green cubic splines, and yellow MARS.</p>
Full article ">Figure 6
<p>Test mean squared error vs. the total number of training samples for four different noise levels. The average values over five runs are presented. Blue represents SDNN, red LDNN, green cubic splines, and yellow MARS.</p>
Full article ">Figure 7
<p>SNR vs. noise level (0%, 1%, 5%, 10%) for eight different levels of sparsity (sample training points) computed on the test set predictions and ground truth. The average values over five runs are presented. Blue represents SDNN, red LDNN, green cubic splines, and yellow MARS.</p>
Full article ">Figure 8
<p>SNR vs. the total number of training samples for four different noise levels. The average values over five runs are presented. Blue colour represents SDNN, green cubic splines, and yellow MARS.</p>
Full article ">Figure A1
<p>Predictions’ of all tested methods on the test set for noise = 0%, trained on 50 samples. Blue represents SDNN, red LDNN, green cubic splines, and yellow MARS.</p>
Full article ">Figure A2
<p>Predictions’ of all tested methods on the test set for noise = 0%, trained on 900 samples. Blue represents SDNN, red LDNN, green cubic splines, and yellow MARS.</p>
Full article ">Figure A3
<p>Predictions’ of all tested methods on the test set for noise = 10%, trained on 50 samples. Blue represents SDNN, red LDNN, green cubic splines, and yellow MARS.</p>
Full article ">Figure A4
<p>Predictions’ of all tested methods on the test set for noise = 10%, trained on 900 samples. Blue represents SDNN, red LDNN, green cubic splines, and yellow MARS.</p>
Full article ">
12 pages, 1315 KiB  
Article
Mathematical Modeling: Cisplatin Binding to Deoxyribonucleic Acid
by Mansoor H. Alshehri
Mathematics 2023, 11(1), 235; https://doi.org/10.3390/math11010235 - 3 Jan 2023
Viewed by 1525
Abstract
The discovery of the cisplatin drug attracted considerable research attention as scientists strove to understand the drug’s mechanism in the human body that is responsible for destroying cancer cells, particularly the coordination between the cisplatin drug and deoxyribonucleic acid. Here, the binding energies [...] Read more.
The discovery of the cisplatin drug attracted considerable research attention as scientists strove to understand the drug’s mechanism in the human body that is responsible for destroying cancer cells, particularly the coordination between the cisplatin drug and deoxyribonucleic acid. Here, the binding energies of a cisplatin molecule relative to double-stranded deoxyribonucleic acid are obtained. The interactions of the system are determined by performing double integrals, and the analytical expressions are derived from the Lennard–Jones function and the continuum approximation; here, it is assumed that a discrete atomic structure might be replaced by surfaces with a constant average atomic density. The results observed that the cisplatin molecule is binding to the double-stranded deoxyribonucleic acid at either the minor or major grooves. By minimizing the interaction energies between the cisplatin molecule and the minor and major grooves, for arbitrary distances λ and arbitrary tilt angles φ from the axis of the helix of the double-stranded deoxyribonucleic acid, the binding energies are determined, and their values are ≈6 and ≈12.5 (kcal/mol), respectively. Thus, we may deduce that the major groove in double-stranded deoxyribonucleic acid is the most preferred groove for linking with the cisplatin molecule. The current analysis might help in the equivalent continuum modeling of deoxyribonucleic acids and nanocomposites. Full article
Show Figures

Figure 1

Figure 1
<p>Geometry of a cisplatin molecule binding to dsDNA.</p>
Full article ">Figure 2
<p>Geometric parameterization of a cisplatin molecule that is binding to dsDNA.</p>
Full article ">Figure 3
<p>Energies of Cis molecules binding to DNA with respect to <math display="inline"><semantics> <mi>λ</mi> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>ψ</mi> <mo>=</mo> <mi>π</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 3 Cont.
<p>Energies of Cis molecules binding to DNA with respect to <math display="inline"><semantics> <mi>λ</mi> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>ψ</mi> <mo>=</mo> <mi>π</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Total energies of Cis molecules binding to DNA with respect to <math display="inline"><semantics> <mi>φ</mi> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>ψ</mi> <mo>=</mo> <mi>π</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Energies of Cis binding to DNA with respect to <math display="inline"><semantics> <mi>λ</mi> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>ψ</mi> <mo>=</mo> <mn>12</mn> <mi>π</mi> <mo>/</mo> <mn>17</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Energies of Cis molecules binding to dsDNA with respect to <math display="inline"><semantics> <mi>φ</mi> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>ψ</mi> <mo>=</mo> <mn>12</mn> <mi>π</mi> <mo>/</mo> <mn>17</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Three-dimensional plot of Cis molecules binding to dsDNA.</p>
Full article ">
14 pages, 5332 KiB  
Article
Spatial Computing in Modular Spiking Neural Networks with a Robotic Embodiment
by Sergey A. Lobov, Alexey N. Mikhaylov, Ekaterina S. Berdnikova, Valeri A. Makarov and Victor B. Kazantsev
Mathematics 2023, 11(1), 234; https://doi.org/10.3390/math11010234 - 3 Jan 2023
Cited by 4 | Viewed by 2438
Abstract
One of the challenges in modern neuroscience is creating a brain-on-a-chip. Such a semiartificial device based on neural networks grown in vitro should interact with the environment when embodied in a robot. A crucial point in this endeavor is developing a neural network [...] Read more.
One of the challenges in modern neuroscience is creating a brain-on-a-chip. Such a semiartificial device based on neural networks grown in vitro should interact with the environment when embodied in a robot. A crucial point in this endeavor is developing a neural network architecture capable of associative learning. This work proposes a mathematical model of a midscale modular spiking neural network (SNN) to study learning mechanisms within the brain-on-a-chip context. We show that besides spike-timing-dependent plasticity (STDP), synaptic and neuronal competitions are critical factors for successful learning. Moreover, the shortest pathway rule can implement the synaptic competition responsible for processing conditional stimuli coming from the environment. This solution is ready for testing in neuronal cultures. The neuronal competition can be implemented by lateral inhibition actuating over the SNN modulus responsible for unconditional responses. Empirical testing of this approach is challenging and requires the development of a technique for growing cultures with a given ratio of excitatory and inhibitory neurons. We test the modular SNN embedded in a mobile robot and show that it can establish the association between touch (unconditional) and ultrasonic (conditional) sensors. Then, the robot can avoid obstacles without hitting them, relying on ultrasonic sensors only. Full article
Show Figures

Figure 1

Figure 1
<p>Model SNN architectures mimicking in vitro neuronal cultures coupled through microfluidic channels in global circuits. (<b>A</b>) Local networks, each consisting of 500 neurons distributed over a rectangular substrate, are coupled using long-scale axons of projecting neurons in a global network structure. Within each network, neurons are linked by predominantly local couplings (red and blue circles correspond to excitatory and inhibitory neurons, respectively). (<b>B</b>) Global network architectures with a different number of inputs and outputs subject to Pavlovian learning studied in this work. Each circle corresponds to a local subnetwork (see (<b>A</b>)). Arrowed links indicate the direction of internetwork couplings. Blue couplings are inhibitory.</p>
Full article ">Figure 2
<p>Quantification of interneuron couplings in single neurons and network structures. (<b>A</b>) Two model architectures with unidirectionally coupled individual neurons (<b>top</b>) and subnets by ten projecting axons (<b>bottom</b>). (<b>B</b>) The connection efficiency (bursts “passing” from one structure to the other) vs. coupling weight (for subnets the average weight is used). (<b>C</b>) Self-reinforcement of the coupling weight for individual neurons in spontaneous conditions (Spont), under stimulation of the presynaptic neuron (S1), and paired stimulation (S1 + S2). (<b>D</b>) The same as in (<b>C</b>) but for the subnets.</p>
Full article ">Figure 3
<p>Emergence of cyclic structures and rhythmic activity. (<b>A</b>) Architecture with unidirectional clockwise connections facilitates a clockwise cyclic activity. (<b>B</b>) The connection efficiency (bursts passing from one subnet to another) vs. the number of connections between subnets (<b>A</b>) before and after learning. (<b>C</b>) Raster plots of spiking activity before and after learning. Learning leads to the emergence of a wave circulating in the network. Colors indicate spikes of neurons from the corresponding subnets shown in (<b>A</b>). (<b>D</b>) Initial architecture with bidirectional connections. A cyclic activity running either clockwise or counterclockwise can emerge. (<b>E</b>) An example of the weight’s dynamics: <span class="html-italic">W</span><sub>ckw</sub> and <span class="html-italic">W</span><sub>cckw</sub> are the average weights of clockwise and counterclockwise connections, respectively. Clockwise connections are depressed, while counterclockwise couplings are potentiated. (<b>F</b>) Example of raster plots for the bidirectional SNN with a counterclockwise activity after learning.</p>
Full article ">Figure 4
<p>The shortest pathway rule for modular SNNs solves the problem of depressing synapses not involved in relevant associations of stimuli. (<b>A</b>) The network architecture. Subnet 3 receives input from subnet 1 directly and through subnet 2. The rule states that the shortest path (through W1) is potentiated while the longer (through W2) is inhibited. (<b>B</b>) Dynamics of the internetwork connections. The red arrow indicates the moment when the stimulation is turned on.</p>
Full article ">Figure 5
<p>Associative learning due to synaptic competition. (<b>A</b>) Network architecture with internetwork connections <span class="html-italic">W<sub>C</sub></span> implementing competition between subnets 1 and 2. The SNN provides association of one of the conditional stimuli (CS 1 or CS 2) with unconditional stimulus US. (<b>B</b>) Dynamics of weights and the learning quality under conditional stimuli CS1 and CS2. Blue and orange areas correspond to associations CS1-US and CS2-US, respectively. (<b>C</b>) Average weights of internetwork connections <span class="html-italic">W</span>1 and <span class="html-italic">W</span>2 and the learning quality coefficient vs. average weights of internetwork connections <span class="html-italic">W<sub>C</sub></span>.</p>
Full article ">Figure 6
<p>Neural competition enables associative learning of conditional stimulus with two unconditional ones. (<b>A</b>) Modular SNN with a single conditional stimulus CS and two unconditional stimuli (US1, US2) applied to a single elongated module. Inhibitory interneurons, which suppress the spread of excitation in subnet 2, provide neuronal competition and association of CS either with US1 or US2. (<b>B</b>) Learning quality Q as a function of the parameters of inhibitory connections: coupling weight <span class="html-italic">W<sub>I</sub></span> and decay time <span class="html-italic">τ<sub>I</sub></span>.</p>
Full article ">Figure 7
<p>Embedding a modular SNN capable of Pavlovian conditioning in a mobile robot. The robot learns collision avoidance. (<b>A</b>) The LEGO robot and mapping of sensory stimuli. (<b>B</b>) Modular SNN consisting of two subnets connected by unidirectional couplings (<span class="html-italic">W</span><sub>P</sub> and <span class="html-italic">W</span><sub>D</sub>) and the configuration of stimuli. (<b>C</b>) Training the robot. The left touch sensor and left ultrasonic sonar are simultaneously triggered. (<b>D</b>) The dynamics of the connections <span class="html-italic">W</span><sub>P</sub> and <span class="html-italic">W</span><sub>D</sub>, and the learning quality <span class="html-italic">Q</span> during learning.</p>
Full article ">Figure 8
<p>Testing the robot’s performance. (<b>A</b>) The experimental arena. The robot’s trace is shown in purple. Obstacles are in white. (<b>B</b>) The number of collisions with obstacles vs. the learning quality <span class="html-italic">Q</span>.</p>
Full article ">
19 pages, 2985 KiB  
Article
Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model
by Theyazn H. H. Aldhyani and Hasan Alkahtani
Mathematics 2023, 11(1), 233; https://doi.org/10.3390/math11010233 - 3 Jan 2023
Cited by 56 | Viewed by 6463
Abstract
Attackers are increasingly targeting Internet of Things (IoT) networks, which connect industrial devices to the Internet. To construct network intrusion detection systems (NIDSs), which can secure Agriculture 4.0 networks, powerful deep learning (DL) models have recently been deployed. An effective and adaptable intrusion [...] Read more.
Attackers are increasingly targeting Internet of Things (IoT) networks, which connect industrial devices to the Internet. To construct network intrusion detection systems (NIDSs), which can secure Agriculture 4.0 networks, powerful deep learning (DL) models have recently been deployed. An effective and adaptable intrusion detection system may be implemented by using the architectures of long short-term memory (LSTM) and convolutional neural network combined with long short-term memory (CNN–LSTM) for detecting DDoS attacks. The CIC-DDoS2019 dataset was used to design a proposal for detecting different types of DDoS attacks. The dataset was developed using the CICFlowMeter-V3 network. The standard network traffic dataset, including NetBIOS, Portmap, Syn, UDPLag, UDP, and normal benign packets, was used to test the development of deep learning approaches. Precision, recall, F1-score, and accuracy were among the measures used to assess the model’s performance. The suggested technology was able to reach a high degree of precision (100%). The CNN–LSTM has a score of 100% with respect to all the evaluation metrics. We used a deep learning method to build our model and compare it to existing systems to determine how well it performs. In addition, we believe that this proposed model has highest possible levels of protection against any cyber threat to Agriculture 4.0. Full article
(This article belongs to the Special Issue Analytical Frameworks and Methods for Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Industry 4.0 technology for developing the agriculture sector.</p>
Full article ">Figure 2
<p>Artificial intelligence based on IoT for improving the agriculture sector.</p>
Full article ">Figure 3
<p>Framework of the proposed method.</p>
Full article ">Figure 4
<p>Selecting features by using the correlation coefficient method.</p>
Full article ">Figure 5
<p>LSTM model.</p>
Full article ">Figure 6
<p>CNN–LSTM model for detecting attacks.</p>
Full article ">Figure 7
<p>LSTM model performance for detection attacks on Agriculture 4.0. (<b>a</b>) Model accuracy; (<b>b</b>) model loss.</p>
Full article ">Figure 8
<p>In the LSTM model, confusion metric.</p>
Full article ">Figure 9
<p>The CNN–LSTM model’s performance for detection of attacks on Agriculture 4.0. (<b>a</b>) Model accuracy (<b>b</b>) Model loss.</p>
Full article ">Figure 10
<p>Confusion metrics of the CNN–LSTM model.</p>
Full article ">Figure 11
<p>ROC of proposed system: (<b>a</b>) LSTM model; (<b>b</b>) CNN–LSTM model.</p>
Full article ">Figure 12
<p>Comparative performance between the CNN–LSTM model and existing approaches to the detection of Agriculture 4.0 attacks.</p>
Full article ">
3 pages, 191 KiB  
Editorial
Preface to the Special Issue on “Mathematical Methods and Operation Research in Logistics, Project Planning, and Scheduling”
by Zsolt Tibor Kosztyán and Zoltán Kovács
Mathematics 2023, 11(1), 232; https://doi.org/10.3390/math11010232 - 3 Jan 2023
Cited by 1 | Viewed by 1750
Abstract
In the last decade, the Industrial Revolution 4.0 brought flexible supply chains and flexible design projects to the fore [...] Full article
22 pages, 9137 KiB  
Article
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
by Shenli Zhu, Xiaoheng Deng, Wendong Zhang and Congxu Zhu
Mathematics 2023, 11(1), 231; https://doi.org/10.3390/math11010231 - 2 Jan 2023
Cited by 62 | Viewed by 4172
Abstract
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathematical model of the new chaotic system combines a sine map and a fraction [...] Read more.
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathematical model of the new chaotic system combines a sine map and a fraction operation. Compared with some traditional one-dimensional chaotic systems, the new chaotic system has a larger range of chaotic parameters and better chaotic characteristics, which makes it more suitable for applications in information encryption. In addition, an image encryption algorithm based on parallel DNA coding is proposed, which overcomes the shortcoming of common DNA coding-based image encryption algorithms. Parallel computing significantly increases the speed of encryption and decryption algorithms. The initial key of the cryptosystem is designed to be related to the SHA-3 hash value of the plaintext image so that the algorithm can resist a chosen-plaintext attack. Simulation experiments and security analysis results show that the proposed image encryption scheme has good encryption performance and less time overhead, and has strong robustness to noise and data loss attacks, which indicates that the proposed image encryption scheme has good application potential in secure communication applications. Full article
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography)
Show Figures

Figure 1

Figure 1
<p>The time sequence and the phase diagrams of system (1): (<b>a</b>) The time sequence generated with system (1); (<b>b</b>) The phase diagram of system (1).</p>
Full article ">Figure 2
<p>Bifurcation diagram and Lyapunov exponent graph of system (1): (<b>a</b>) Bifurcation diagram of system state quantity versus parameter <span class="html-italic">μ</span>; (<b>b</b>) The graph of Lyapunov exponent versus parameter <span class="html-italic">μ</span>.</p>
Full article ">Figure 3
<p>The time-series diagram and cobweb graph of system (1): (<b>a</b>) The time-series diagram, the blue dot data is generated from the initial value 0.23, and the red asterisk data is generated from the initial value 0.23 + 10<sup>−12</sup>; (<b>b</b>) the cobweb graph.</p>
Full article ">Figure 4
<p>Correlation function of system (1): (<b>a</b>) Autocorrelation function; (<b>b</b>) Cross-correlation function.</p>
Full article ">Figure 5
<p>The values of Approximate entropy for different maps. (<b>a</b>) Logistic map; (<b>b</b>) Sine map; (<b>c</b>) Quadratic map; (<b>d</b>) The proposed system.</p>
Full article ">Figure 6
<p>The values of the correlation dimension for different maps. (<b>a</b>) Logistic map; (<b>b</b>) Sine map; (<b>c</b>) Quadratic map; (<b>d</b>) The proposed system.</p>
Full article ">Figure 7
<p>The block diagram of the overall image encryption scheme.</p>
Full article ">Figure 8
<p>The test images and the encrypted results. (<b>a</b>) The image Lena. (<b>b</b>) The image Cameraman. (<b>c</b>) The all-white image. (<b>d</b>) The all-black image. (<b>e</b>) The encrypted image Lena. (<b>f</b>) The encrypted image Cameraman. (<b>g</b>) The encrypted all-white image. (<b>h</b>) The encrypted all-black image.</p>
Full article ">Figure 9
<p>Plaintext/encrypted images and their histograms. (<b>a</b>) Plaintext image Baboon. (<b>b</b>) Histogram of (<b>a</b>). (<b>c</b>) Encrypted image Baboon. (<b>d</b>) Histogram of (<b>c</b>). (<b>e</b>) Plaintext image Peppers. (<b>f</b>) Histogram (<b>e</b>). (<b>g</b>) Encrypted image Peppers. (<b>h</b>) Histogram of (<b>g</b>).</p>
Full article ">Figure 10
<p>Correlation point diagrams of plaintext image Lena and encrypted image Lena. (<b>a</b>) Original Lena in horizontal direction, (<b>b</b>) Original Lena in vertical direction, (<b>c</b>) Original Lena in diagonal direction, (<b>d</b>) Encrypted Lena in horizontal direction, (<b>e</b>) Encrypted Lena in vertical direction, (<b>f</b>) Encrypted Lena in diagonal direction.</p>
Full article ">Figure 10 Cont.
<p>Correlation point diagrams of plaintext image Lena and encrypted image Lena. (<b>a</b>) Original Lena in horizontal direction, (<b>b</b>) Original Lena in vertical direction, (<b>c</b>) Original Lena in diagonal direction, (<b>d</b>) Encrypted Lena in horizontal direction, (<b>e</b>) Encrypted Lena in vertical direction, (<b>f</b>) Encrypted Lena in diagonal direction.</p>
Full article ">Figure 11
<p>Salt and pepper noise intensity of 1%: (<b>a</b>) encrypted image and (<b>b</b>) decrypted image.</p>
Full article ">Figure 12
<p>Salt and pepper noise intensity of 3%: (<b>a</b>) encrypted image and (<b>b</b>) decrypted image.</p>
Full article ">Figure 13
<p>Salt and pepper noise intensity of 5%: (<b>a</b>) encrypted image and (<b>b</b>) decrypted image.</p>
Full article ">Figure 14
<p>The removal of a 32 × 32 sub block: (<b>a</b>) encrypted image and (<b>b</b>) decrypted image.</p>
Full article ">Figure 15
<p>The removal of a 64 × 64 sub block: (<b>a</b>) encrypted image and (<b>b</b>) decrypted image.</p>
Full article ">Figure 16
<p>The removal of a 128 × 128 sub block: (<b>a</b>) encrypted image and (<b>b</b>) decrypted image.</p>
Full article ">
16 pages, 2493 KiB  
Article
Optimal Agent Search Using Surrogate-Assisted Genetic Algorithms
by Seung-Soo Shin and Yong-Hyuk Kim
Mathematics 2023, 11(1), 230; https://doi.org/10.3390/math11010230 - 2 Jan 2023
Cited by 2 | Viewed by 1917
Abstract
An intelligent agent is a program that can make decisions or perform a service based on its environment, user input, and experiences. Due to the complexity of its state and action spaces, agents are approximated by deep neural networks (DNNs), and it can [...] Read more.
An intelligent agent is a program that can make decisions or perform a service based on its environment, user input, and experiences. Due to the complexity of its state and action spaces, agents are approximated by deep neural networks (DNNs), and it can be optimized using methods such as deep reinforcement learning and evolution strategies. However, these methods include simulation-based evaluations in the optimization process, and they are inefficient if the simulation cost is high. In this study, we propose surrogate-assisted genetic algorithms (SGAs), whose surrogate models are used in the fitness evaluation of genetic algorithms, and the surrogates also predict cumulative rewards for an agent’s DNN parameters. To improve the SGAs, we applied stepwise improvements that included multiple surrogates, data standardization, and sampling with dimensional reduction. We conducted experiments using the proposed SGAs in benchmark environments such as cart-pole balancing and lunar lander, and successfully found optimal solutions and significantly reduced computing time. The computing time was reduced by 38% and 95%, in the cart-pole balancing and lunar lander problems, respectively. For the lunar lander problem, an agent with approximately 4% better quality than that found by a gradient-based method was even found. Full article
(This article belongs to the Special Issue Swarm and Evolutionary Computation—Bridging Theory and Practice)
Show Figures

Figure 1

Figure 1
<p>Example of DNN encoding.</p>
Full article ">Figure 2
<p>Scatter plots expressed in 2D through PCA: (<b>a</b>) training data and (<b>b</b>) random sampling added to (<b>a</b>).</p>
Full article ">Figure 3
<p>Flowchart of the proposed surrogate-assisted genetic algorithm.</p>
Full article ">Figure 4
<p>Example of the cart-pole balancing problem environment.</p>
Full article ">Figure 5
<p>Example of the lunar lander problem environment.</p>
Full article ">Figure 6
<p>Return distribution of each neural network architecture.</p>
Full article ">Figure 7
<p>Performance for each architecture with stepwise improvement. (<b>a</b>) RMSE and (<b>b</b>) Pearson correlation coefficient.</p>
Full article ">Figure 8
<p>Calculation times of the baseline DDQN and the proposed SGAs for cart-pole balancing optimization.</p>
Full article ">Figure 9
<p>Fitness of the proposed SGAs for the lunar lander problem according to generation.</p>
Full article ">
13 pages, 1570 KiB  
Article
A Trie Based Set Similarity Query Algorithm
by Lianyin Jia, Junzhuo Tang, Mengjuan Li, Runxin Li, Jiaman Ding and Yinong Chen
Mathematics 2023, 11(1), 229; https://doi.org/10.3390/math11010229 - 2 Jan 2023
Cited by 1 | Viewed by 1826
Abstract
Set similarity query is a primitive for many applications, such as data integration, data cleaning, and gene sequence alignment. Most of the existing algorithms are inverted index based, they usually filter unqualified sets one by one and do not have sufficient support for [...] Read more.
Set similarity query is a primitive for many applications, such as data integration, data cleaning, and gene sequence alignment. Most of the existing algorithms are inverted index based, they usually filter unqualified sets one by one and do not have sufficient support for duplicated sets, thus leading to low efficiency. To solve this problem, this paper designs T-starTrie, an efficient trie based index for set similarity query, which can naturally group sets with the same prefix into one node, and can filter all sets corresponding to the node at a time, thereby significantly improving the candidates generation efficiency. In this paper, we find that the set similarity query problem can be transformed into matching nodes of the first-layer (FMNodes) detecting problem on T-starTrie. Therefore, an efficient FLMNode detection algorithm is designed. Based on this, an efficient set similarity query algorithm, TT-SSQ, is implemented by developing a variety of filtering techniques. Experimental results show that TT-SSQ can be up to 3.10x faster than existing algorithms. Full article
(This article belongs to the Special Issue Data Mining: Analysis and Applications)
Show Figures

Figure 1

Figure 1
<p>The inverted index.</p>
Full article ">Figure 2
<p>The sample trie created for the dataset in <a href="#mathematics-11-00229-t001" class="html-table">Table 1</a>.</p>
Full article ">Figure 3
<p>The expanded node structure.</p>
Full article ">Figure 4
<p>T-starTrie.</p>
Full article ">Figure 5
<p>The results for different orderings.</p>
Full article ">Figure 6
<p>The results for different filtering policies.</p>
Full article ">Figure 7
<p>The results for supporting different query thresholds.</p>
Full article ">Figure 8
<p>The comparisons among different algorithms.</p>
Full article ">
20 pages, 1730 KiB  
Article
Statistical Depth for Text Data: An Application to the Classification of Healthcare Data
by Sergio Bolívar, Alicia Nieto-Reyes and Heather L. Rogers
Mathematics 2023, 11(1), 228; https://doi.org/10.3390/math11010228 - 2 Jan 2023
Cited by 5 | Viewed by 2808
Abstract
This manuscript introduces a new concept of statistical depth function: the compositional D-depth. It is the first data depth developed exclusively for text data, in particular, for those data vectorized according to a frequency-based criterion, such as the tf-idf (term frequency–inverse document [...] Read more.
This manuscript introduces a new concept of statistical depth function: the compositional D-depth. It is the first data depth developed exclusively for text data, in particular, for those data vectorized according to a frequency-based criterion, such as the tf-idf (term frequency–inverse document frequency) statistic, which results in most vector entries taking a value of zero. The proposed data depth consists of considering the inverse discrete Fourier transform of the vectorized text fragments and then applying a statistical depth for functional data, D. This depth is intended to address the problem of sparsity of numerical features resulting from the transformation of qualitative text data into quantitative data, which is a common procedure in most natural language processing frameworks. Indeed, this sparsity hinders the use of traditional statistical depths and machine learning techniques for classification purposes. In order to demonstrate the potential value of this new proposal, it is applied to a real-world case study which involves mapping Consolidated Framework for Implementation and Research (CFIR) constructs to qualitative healthcare data. It is shown that the DDG-classifier yields competitive results and outperforms all studied traditional machine learning techniques (logistic regression with LASSO regularization, artificial neural networks, decision trees, and support vector machines) when used in combination with the newly defined compositional D-depth. Full article
Show Figures

Figure 1

Figure 1
<p>Block diagram representing the steps followed to obtain and validate the proposed depth function designed for text data.</p>
Full article ">Figure 2
<p>Histogram showing the sparsity of the vectorized training set. The horizontal axis shows the number of coordinates that are zero in the vectors resulting from the vectorization of the text fragments conforming the training set, while the vertical axis shows the absolute frequency of occurrence. The red vertical dashed line represents the average number of coordinates that are zero in the vectorized text fragments that form the training set.</p>
Full article ">Figure 3
<p>Histogram showing the small concentration of non-zero coordinates in the vectorized training set. The horizontal axis shows the number of coordinates that are non-zero in the vectors resulting from the vectorization of the text fragments conforming the training set, while the vertical axis shows the absolute frequency of occurrence. The red vertical dashed line represents the average number of coordinates that are non-zero in the vectorized text fragments that form the training set.</p>
Full article ">Figure 4
<p>Vectorized representation of text fragments <math display="inline"><semantics> <msub> <mi>D</mi> <mn>1</mn> </msub> </semantics></math> (red line) and <math display="inline"><semantics> <msub> <mi>D</mi> <mn>7</mn> </msub> </semantics></math> (blue line) of the training set. Note that parallel coordinates are used. The horizontal axis represents each of the unique words in the training set sorted alphabetically (instead of the word itself, we represent the order number that results from sorting all words alphabetically, so that for example the word <span class="html-italic">“a”</span> is represented by a 1), while the vertical axis shows their <span class="html-italic">tf-idf</span> statistic.</p>
Full article ">Figure 5
<p>Modulus of the inverse Fourier transform applied to the vectorized text fragments shown in <a href="#mathematics-11-00228-f004" class="html-fig">Figure 4</a>. Again, the red and blue curves correspond to the text fragments <math display="inline"><semantics> <msub> <mi>D</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>D</mi> <mn>7</mn> </msub> </semantics></math> of the training set.</p>
Full article ">Figure 6
<p>Schematic representation of the idea behind the compositional depth. The upper part shows the frequency decomposition of a wave in the time domain via the Fourier transform (FT). The inverse is also represented (IFT). The lower part illustrates how the inverse Fourier transformation affect text fragments <math display="inline"><semantics> <mrow> <msub> <mi>D</mi> <mn>1</mn> </msub> <mo>,</mo> </mrow> </semantics></math> in red, and <math display="inline"><semantics> <mrow> <msub> <mi>D</mi> <mn>7</mn> </msub> <mo>,</mo> </mrow> </semantics></math> in blue, of the training set.</p>
Full article ">Figure 7
<p>Results of applying the <math display="inline"><semantics> <mrow> <mi>D</mi> <msup> <mi>D</mi> <mi>G</mi> </msup> </mrow> </semantics></math>-classifier(HS,kNN) to the multivariate text data (no Fourier transformation is performed yet). That is, the <math display="inline"><semantics> <mrow> <mi>D</mi> <msup> <mi>D</mi> <mi>G</mi> </msup> </mrow> </semantics></math>-classifier with the HS depth and the kNN as the classification rule is used. The <span class="html-italic">DD</span>-plot (<b>left</b> plot) represents the training data and the confusion matrix (<b>right</b> plot) the test data.</p>
Full article ">Figure 8
<p>Results of applying the <math display="inline"><semantics> <mrow> <mi>D</mi> <msup> <mi>D</mi> <mi>G</mi> </msup> </mrow> </semantics></math>-classifier(ChordDist,RF) to the multivariate text data (no Fourier transform is performed yet). The <span class="html-italic">DD</span>-plot on the left uses the chord distance depth, and random forest as the classification rule. The right plot represents the confusion matrix resulting from applying the former procedure to the test sample. The red and blue points indicate whether the observations in the training sample belong to class 1 or 0, respectively. The green and orange crosses are the test observations corresponding to class 1 and 0, respectively.</p>
Full article ">Figure 9
<p>Results of applying the <math display="inline"><semantics> <mrow> <mi>D</mi> <msup> <mi>D</mi> <mi>G</mi> </msup> </mrow> </semantics></math>-classifier to the Fourier-transformed text data i.e., together with the compositional <span class="html-italic">D</span>-depth. The <span class="html-italic">DD</span>-plot in the upper left corner uses compositional FM-depth, while the <span class="html-italic">DD</span>-plot in the lower left corner uses compositional RP-depth. In both cases, linear discriminant analysis is used as the classification rule. The top right plot shows the confusion matrix that results when the <math display="inline"><semantics> <mrow> <mi>D</mi> <msup> <mi>D</mi> <mi>G</mi> </msup> </mrow> </semantics></math>-classifier (compFM,lda) is applied to the test sample. Similarly, the bottom right plot shows the confusion matrix that results when the <math display="inline"><semantics> <mrow> <mi>D</mi> <msup> <mi>D</mi> <mi>G</mi> </msup> </mrow> </semantics></math>-classifier (compRP,lda) is applied to the test sample.</p>
Full article ">
13 pages, 2410 KiB  
Article
Approach to the Numerical Study of Wave Processes in a Layered and Fractured Porous Media in a Two-Dimensional Formulation
by Amir A. Gubaidullin, Olga Yu. Boldyreva and Dina N. Dudko
Mathematics 2023, 11(1), 227; https://doi.org/10.3390/math11010227 - 2 Jan 2023
Cited by 3 | Viewed by 1105
Abstract
A new approach to the numerical study of arbitrary waveform impulses in a layered porous and fractured-porous medium in a two-dimensional formulation has been developed. Layers can have different characteristics and contain fractures. A computer implementation of the mathematical model based on the [...] Read more.
A new approach to the numerical study of arbitrary waveform impulses in a layered porous and fractured-porous medium in a two-dimensional formulation has been developed. Layers can have different characteristics and contain fractures. A computer implementation of the mathematical model based on the finite-difference MacCormack method has been completed. A number of test calculations have been carried out confirming the reliability of the numerical solutions obtained. The possibility of using the proposed approach to solve problems of wave dynamics is shown. Full article
(This article belongs to the Special Issue Mathematical Models of Multiphase Flows in Porous Media)
Show Figures

Figure 1

Figure 1
<p>The initial pressure perturbation.</p>
Full article ">Figure 2
<p>The passage of a traveling plane wave through the boundary of two single-phase media. The profiles (<b>a</b>) and fields (<b>b</b>) of the dimensionless pressure difference <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>p</mi> <mi>f</mi> </msub> <mo>/</mo> <msub> <mi>p</mi> <mn>0</mn> </msub> </mrow> </semantics></math> when a traveling plane wave passes through the boundary of two single-phase media for several time points. The color scale on the right (<b>b</b>) shows the pressure level <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>p</mi> <mi>f</mi> </msub> <mo>/</mo> <msub> <mi>p</mi> <mn>0</mn> </msub> </mrow> </semantics></math>. Calculated “oscillograms” of pressure at two points for the first (blue line) and second (red line) media (<b>c</b>).</p>
Full article ">Figure 3
<p>The initial perturbation function <math display="inline"><semantics> <mrow> <mi>ϕ</mi> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The field of dimensionless pressure difference <math display="inline"><semantics> <mrow> <mi>Δ</mi> <msub> <mi>p</mi> <mi>f</mi> </msub> <mo>/</mo> <msub> <mi>p</mi> <mn>0</mn> </msub> </mrow> </semantics></math> when the perturbation propagates from the source and passes/reflects through the boundary of two single-phase media for several time points. The color scale on the right shows a pressure level <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>p</mi> <mi>l</mi> </msub> <mo>/</mo> <msub> <mi>p</mi> <mn>0</mn> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>The fields of average pressure in a liquid <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>p</mi> <mi>l</mi> </msub> <mo>/</mo> <msub> <mi>p</mi> <mn>0</mn> </msub> </mrow> </semantics></math> during the propagation of the perturbation from the source and its passage/reflection through the boundary of the porous media and fractured-porous media for several time points. The color scale on the right shows the pressure level <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>p</mi> <mi>l</mi> </msub> <mo>/</mo> <msub> <mi>p</mi> <mn>0</mn> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>The average pressure profiles <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>p</mi> <mi>l</mi> </msub> <mo>/</mo> <msub> <mi>p</mi> <mn>0</mn> </msub> </mrow> </semantics></math> in a liquid when a perturbation propagates from a source and passes/reflects through the boundary of the porous media and fractured-porous media for several time points in one-dimensional (<b>a</b>) and two-dimensional (<b>b</b>) cases, <span class="html-italic">x</span> = 100 cm.</p>
Full article ">
16 pages, 316 KiB  
Article
Double-Sources Queuing-Inventory Systems with Finite Waiting Room and Destructible Stocks
by Agassi Melikov, Ramil Mirzayev and Janos Sztrik
Mathematics 2023, 11(1), 226; https://doi.org/10.3390/math11010226 - 2 Jan 2023
Cited by 5 | Viewed by 1461
Abstract
Models of double-source queuing-inventory systems are studied in the presence of a finite buffer for waiting in the queue of consumer customers, where instant destruction of inventory is possible. It is assumed that the lead times of orders, as well as the cost [...] Read more.
Models of double-source queuing-inventory systems are studied in the presence of a finite buffer for waiting in the queue of consumer customers, where instant destruction of inventory is possible. It is assumed that the lead times of orders, as well as the cost of delivery from various sources, differ from each other. Replenishment of stocks from various sources is carried out according to the following scheme: if the inventory level drops to the reorder point s, then a regular order for the supply of inventory to a slow source is generated; if the inventory level falls below a certain threshold value r, where r < s, then the system instantly cancels the regular order and generates an emergency order to the fast source. Models of systems that use (s, S) or (s, Q) replenishment policies are studied. Exact and approximate methods for finding the performance measures of the models under study are proposed. The problems of minimizing the total cost are solved by choosing the appropriate values of the parameters s and r when using different replenishment policies. Numerical examples demonstrated the high accuracy of an approximate method as well as compared performance measures of the system under various replenishment policies. Full article
Previous Issue
Back to TopTop